Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fleW7NKwt9.exe

Overview

General Information

Sample Name:fleW7NKwt9.exe
Analysis ID:652387
MD5:07edca391e6f402f748cb369540e7073
SHA1:c64b12430fb6b2dc5b5551bc0ee2aea033aeae4f
SHA256:d30687d6d06df3a60501b077b6dcfa82e3ba0c0efea48f17126e2607ce140a37
Tags:exeSnakeKeylogger
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AntiVM3
Snort IDS alert for network traffic
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Yara detected Generic Downloader
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • fleW7NKwt9.exe (PID: 6476 cmdline: "C:\Users\user\Desktop\fleW7NKwt9.exe" MD5: 07EDCA391E6F402F748CB369540E7073)
    • fleW7NKwt9.exe (PID: 1316 cmdline: C:\Users\user\Desktop\fleW7NKwt9.exe MD5: 07EDCA391E6F402F748CB369540E7073)
      • WerFault.exe (PID: 6644 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 1528 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "myreportlog@valete.buzz", "Password": "7213575aceACE@#$", "Host": "cp5ua.hyperhost.ua", "Port": "myreport@valete.buzz"}
SourceRuleDescriptionAuthorStrings
00000003.00000000.423560430.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000003.00000000.423560430.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      00000003.00000000.423560430.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000000.423560430.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x173b0:$x1: $%SMTPDV$
        • 0x173c6:$x2: $#TheHashHere%&
        • 0x18760:$x3: %FTPDV$
        • 0x18828:$x4: $%TelegramDv$
        • 0x14cf7:$x5: KeyLoggerEventArgs
        • 0x1508d:$x5: KeyLoggerEventArgs
        • 0x187d0:$m1: | Snake Keylogger
        • 0x18888:$m1: | Snake Keylogger
        • 0x189dc:$m1: | Snake Keylogger
        • 0x18b02:$m1: | Snake Keylogger
        • 0x18c5c:$m1: | Snake Keylogger
        • 0x18784:$m2: Clipboard Logs ID
        • 0x18992:$m2: Screenshot Logs ID
        • 0x18aa6:$m2: keystroke Logs ID
        • 0x18c92:$m3: SnakePW
        • 0x1896a:$m4: \SnakeKeylogger\
        00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 36 entries
          SourceRuleDescriptionAuthorStrings
          3.0.fleW7NKwt9.exe.400000.14.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
          • 0x1b2e6:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x1a4cf:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x1a916:$a4: \Orbitum\User Data\Default\Login Data
          • 0x1ba97:$a5: \Kometa\User Data\Default\Login Data
          3.0.fleW7NKwt9.exe.400000.14.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            3.0.fleW7NKwt9.exe.400000.14.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              3.0.fleW7NKwt9.exe.400000.14.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                3.0.fleW7NKwt9.exe.400000.14.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 76 entries
                  No Sigma rule has matched
                  Timestamp:192.168.2.6132.226.8.16949769802842536 06/26/22-09:36:21.815879
                  SID:2842536
                  Source Port:49769
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: fleW7NKwt9.exeVirustotal: Detection: 33%Perma Link
                  Source: fleW7NKwt9.exeReversingLabs: Detection: 53%
                  Source: fleW7NKwt9.exeJoe Sandbox ML: detected
                  Source: 3.0.fleW7NKwt9.exe.400000.4.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 3.0.fleW7NKwt9.exe.400000.8.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 3.0.fleW7NKwt9.exe.400000.14.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 3.0.fleW7NKwt9.exe.400000.6.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 3.0.fleW7NKwt9.exe.400000.10.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 3.0.fleW7NKwt9.exe.400000.12.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 3.0.fleW7NKwt9.exe.400000.16.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 3.2.fleW7NKwt9.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 3.0.fleW7NKwt9.exe.400000.4.unpackMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "myreportlog@valete.buzz", "Password": "7213575aceACE@#$", "Host": "cp5ua.hyperhost.ua", "Port": "myreport@valete.buzz"}
                  Source: fleW7NKwt9.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: fleW7NKwt9.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: System.Core.ni.pdbRSDSD source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Xml.ni.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: \??\C:\Windows\mscorlib.pdbE source: fleW7NKwt9.exe, 00000003.00000002.466774937.0000000000E84000.00000004.00000020.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000000.439577366.0000000000E84000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: fleW7NKwt9.exe, 00000003.00000002.466774937.0000000000E84000.00000004.00000020.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000000.439577366.0000000000E84000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: System.ni.pdbRSDS source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: IC:\Users\user\Desktop\fleW7NKwt9.PDB source: fleW7NKwt9.exe, 00000003.00000000.439127401.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000002.466504536.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp
                  Source: Binary string: System.Configuration.ni.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: mscorlib.ni.pdbRSDS source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Configuration.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Xml.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Core.ni.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: Microsoft.VisualBasic.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Windows.Forms.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb" source: fleW7NKwt9.exe, 00000003.00000002.466774937.0000000000E84000.00000004.00000020.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000000.439577366.0000000000E84000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb1< source: fleW7NKwt9.exe, 00000003.00000002.466774937.0000000000E84000.00000004.00000020.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000000.439577366.0000000000E84000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: mscorlib.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: fleW7NKwt9.exe, 00000003.00000002.466774937.0000000000E84000.00000004.00000020.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000000.439577366.0000000000E84000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: mscorlib.ni.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: j0C:\Windows\mscorlib.pdb source: fleW7NKwt9.exe, 00000003.00000000.439127401.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000002.466504536.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp
                  Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Core.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Core.pdb% source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Xml.ni.pdbRSDS source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Xml.pdbqk source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.ni.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.pdbx source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: fleW7NKwt9.PDB source: fleW7NKwt9.exe, 00000003.00000000.439127401.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000002.466504536.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\Desktop\fleW7NKwt9.PDB source: fleW7NKwt9.exe, 00000003.00000000.439127401.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000002.466504536.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp

                  Networking

                  barindex
                  Source: TrafficSnort IDS: 2842536 ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.6:49769 -> 132.226.8.169:80
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeDNS query: name: checkip.dyndns.org
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.14.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.fleW7NKwt9.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.16.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.37c4b60.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.3731140.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.36b5b30.7.raw.unpack, type: UNPACKEDPE
                  Source: Joe Sandbox ViewASN Name: UTMEMUS UTMEMUS
                  Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: fleW7NKwt9.exe, 00000003.00000002.467289457.0000000002BE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: fleW7NKwt9.exe, 00000003.00000002.467045157.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000002.467289457.0000000002BE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: fleW7NKwt9.exe, 00000003.00000002.467045157.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: fleW7NKwt9.exe, 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: fleW7NKwt9.exe, 00000003.00000002.467045157.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: fleW7NKwt9.exe, 00000003.00000002.467045157.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000000.00000003.385930269.0000000000AAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: fleW7NKwt9.exe, 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: fleW7NKwt9.exe, 00000000.00000002.426464275.0000000000820000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                  System Summary

                  barindex
                  Source: 3.0.fleW7NKwt9.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.0.fleW7NKwt9.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.0.fleW7NKwt9.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 3.0.fleW7NKwt9.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.0.fleW7NKwt9.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.0.fleW7NKwt9.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.fleW7NKwt9.exe.37c4b60.9.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.fleW7NKwt9.exe.37c4b60.9.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.fleW7NKwt9.exe.37c4b60.9.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 3.0.fleW7NKwt9.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.0.fleW7NKwt9.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.0.fleW7NKwt9.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 3.0.fleW7NKwt9.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.0.fleW7NKwt9.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.0.fleW7NKwt9.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 3.0.fleW7NKwt9.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.0.fleW7NKwt9.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.0.fleW7NKwt9.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 3.0.fleW7NKwt9.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.0.fleW7NKwt9.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.0.fleW7NKwt9.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 3.2.fleW7NKwt9.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.2.fleW7NKwt9.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.2.fleW7NKwt9.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 3.0.fleW7NKwt9.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.0.fleW7NKwt9.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.0.fleW7NKwt9.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.fleW7NKwt9.exe.37c4b60.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.fleW7NKwt9.exe.37c4b60.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.fleW7NKwt9.exe.37c4b60.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.fleW7NKwt9.exe.3731140.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.fleW7NKwt9.exe.3731140.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.fleW7NKwt9.exe.36b5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.fleW7NKwt9.exe.36b5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000003.00000000.423560430.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000003.00000000.421990847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000003.00000000.444529103.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000003.00000000.421362580.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000003.00000002.466292475.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000003.00000000.422724141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: fleW7NKwt9.exe PID: 6476, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: fleW7NKwt9.exe PID: 1316, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: fleW7NKwt9.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 3.0.fleW7NKwt9.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 3.0.fleW7NKwt9.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.0.fleW7NKwt9.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 3.0.fleW7NKwt9.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 3.0.fleW7NKwt9.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.0.fleW7NKwt9.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.fleW7NKwt9.exe.37c4b60.9.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.fleW7NKwt9.exe.37c4b60.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.fleW7NKwt9.exe.37c4b60.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 3.0.fleW7NKwt9.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 3.0.fleW7NKwt9.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.0.fleW7NKwt9.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 3.0.fleW7NKwt9.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 3.0.fleW7NKwt9.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.0.fleW7NKwt9.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 3.0.fleW7NKwt9.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 3.0.fleW7NKwt9.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.0.fleW7NKwt9.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 3.0.fleW7NKwt9.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 3.0.fleW7NKwt9.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.0.fleW7NKwt9.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 3.2.fleW7NKwt9.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 3.2.fleW7NKwt9.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.2.fleW7NKwt9.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 3.0.fleW7NKwt9.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 3.0.fleW7NKwt9.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.0.fleW7NKwt9.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.fleW7NKwt9.exe.37c4b60.9.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.fleW7NKwt9.exe.37c4b60.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.fleW7NKwt9.exe.37c4b60.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.fleW7NKwt9.exe.3731140.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.fleW7NKwt9.exe.3731140.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.fleW7NKwt9.exe.36b5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.fleW7NKwt9.exe.36b5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000003.00000000.423560430.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000003.00000000.421990847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000003.00000000.444529103.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000003.00000000.421362580.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000003.00000002.466292475.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000003.00000000.422724141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: fleW7NKwt9.exe PID: 6476, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: fleW7NKwt9.exe PID: 1316, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 1528
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 0_2_000DAA3E0_2_000DAA3E
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 0_2_000DAE3E0_2_000DAE3E
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 0_2_000DB03E0_2_000DB03E
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 0_2_000DB26C0_2_000DB26C
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 0_2_000DAC6B0_2_000DAC6B
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 0_2_000DB13E0_2_000DB13E
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 0_2_000DAF3E0_2_000DAF3E
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 0_2_000DAB730_2_000DAB73
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 0_2_00A9C8740_2_00A9C874
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 0_2_00A9ECA80_2_00A9ECA8
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 0_2_00A9ECB80_2_00A9ECB8
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 0_2_082400060_2_08240006
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 0_2_082400400_2_08240040
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_0065B26C3_2_0065B26C
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_0065AC6B3_2_0065AC6B
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_0065AA3E3_2_0065AA3E
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_0065AE3E3_2_0065AE3E
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_0065B03E3_2_0065B03E
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_0065AB733_2_0065AB73
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_0065B13E3_2_0065B13E
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_0065AF3E3_2_0065AF3E
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_02942C293_2_02942C29
                  Source: fleW7NKwt9.exe, 00000000.00000000.370071638.000000000018A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRangeMana.exeF vs fleW7NKwt9.exe
                  Source: fleW7NKwt9.exe, 00000000.00000002.432587631.0000000006C90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTweenuserAPI.dllD vs fleW7NKwt9.exe
                  Source: fleW7NKwt9.exe, 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTweenuserAPI.dllD vs fleW7NKwt9.exe
                  Source: fleW7NKwt9.exe, 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs fleW7NKwt9.exe
                  Source: fleW7NKwt9.exe, 00000000.00000002.428238748.0000000002451000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs fleW7NKwt9.exe
                  Source: fleW7NKwt9.exe, 00000000.00000002.426464275.0000000000820000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs fleW7NKwt9.exe
                  Source: fleW7NKwt9.exe, 00000003.00000000.423026433.000000000070A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRangeMana.exeF vs fleW7NKwt9.exe
                  Source: fleW7NKwt9.exe, 00000003.00000002.466751687.0000000000E5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs fleW7NKwt9.exe
                  Source: fleW7NKwt9.exe, 00000003.00000000.439552645.0000000000E5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs fleW7NKwt9.exe
                  Source: fleW7NKwt9.exe, 00000003.00000000.422034604.0000000000422000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs fleW7NKwt9.exe
                  Source: fleW7NKwt9.exeBinary or memory string: OriginalFilenameRangeMana.exeF vs fleW7NKwt9.exe
                  Source: fleW7NKwt9.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: fleW7NKwt9.exeVirustotal: Detection: 33%
                  Source: fleW7NKwt9.exeReversingLabs: Detection: 53%
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeFile read: C:\Users\user\Desktop\fleW7NKwt9.exeJump to behavior
                  Source: fleW7NKwt9.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\fleW7NKwt9.exe "C:\Users\user\Desktop\fleW7NKwt9.exe"
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess created: C:\Users\user\Desktop\fleW7NKwt9.exe C:\Users\user\Desktop\fleW7NKwt9.exe
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 1528
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess created: C:\Users\user\Desktop\fleW7NKwt9.exe C:\Users\user\Desktop\fleW7NKwt9.exeJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fleW7NKwt9.exe.logJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERFD4.tmpJump to behavior
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@4/5@2/2
                  Source: fleW7NKwt9.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1316
                  Source: fleW7NKwt9.exe, CIS443Homework1___InterfaceFiles/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.fleW7NKwt9.exe.d0000.0.unpack, CIS443Homework1___InterfaceFiles/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.0.fleW7NKwt9.exe.d0000.0.unpack, CIS443Homework1___InterfaceFiles/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 3.0.fleW7NKwt9.exe.650000.3.unpack, CIS443Homework1___InterfaceFiles/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 3.0.fleW7NKwt9.exe.650000.15.unpack, CIS443Homework1___InterfaceFiles/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 3.0.fleW7NKwt9.exe.650000.11.unpack, CIS443Homework1___InterfaceFiles/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: fleW7NKwt9.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: fleW7NKwt9.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: System.Core.ni.pdbRSDSD source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Xml.ni.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: \??\C:\Windows\mscorlib.pdbE source: fleW7NKwt9.exe, 00000003.00000002.466774937.0000000000E84000.00000004.00000020.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000000.439577366.0000000000E84000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: fleW7NKwt9.exe, 00000003.00000002.466774937.0000000000E84000.00000004.00000020.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000000.439577366.0000000000E84000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: System.ni.pdbRSDS source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: IC:\Users\user\Desktop\fleW7NKwt9.PDB source: fleW7NKwt9.exe, 00000003.00000000.439127401.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000002.466504536.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp
                  Source: Binary string: System.Configuration.ni.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: mscorlib.ni.pdbRSDS source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Configuration.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Xml.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Core.ni.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: Microsoft.VisualBasic.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Windows.Forms.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb" source: fleW7NKwt9.exe, 00000003.00000002.466774937.0000000000E84000.00000004.00000020.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000000.439577366.0000000000E84000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb1< source: fleW7NKwt9.exe, 00000003.00000002.466774937.0000000000E84000.00000004.00000020.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000000.439577366.0000000000E84000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: mscorlib.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: fleW7NKwt9.exe, 00000003.00000002.466774937.0000000000E84000.00000004.00000020.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000000.439577366.0000000000E84000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: mscorlib.ni.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: j0C:\Windows\mscorlib.pdb source: fleW7NKwt9.exe, 00000003.00000000.439127401.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000002.466504536.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp
                  Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Core.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Core.pdb% source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Xml.ni.pdbRSDS source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.Xml.pdbqk source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.ni.pdb source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: System.pdbx source: WERFD4.tmp.dmp.10.dr
                  Source: Binary string: fleW7NKwt9.PDB source: fleW7NKwt9.exe, 00000003.00000000.439127401.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000002.466504536.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\Desktop\fleW7NKwt9.PDB source: fleW7NKwt9.exe, 00000003.00000000.439127401.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000002.466504536.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp

                  Data Obfuscation

                  barindex
                  Source: fleW7NKwt9.exe, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 0.2.fleW7NKwt9.exe.d0000.0.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 0.0.fleW7NKwt9.exe.d0000.0.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.fleW7NKwt9.exe.650000.3.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.fleW7NKwt9.exe.650000.15.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.fleW7NKwt9.exe.650000.11.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.fleW7NKwt9.exe.650000.5.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.fleW7NKwt9.exe.650000.7.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.fleW7NKwt9.exe.650000.13.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.fleW7NKwt9.exe.650000.1.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.fleW7NKwt9.exe.650000.2.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.fleW7NKwt9.exe.650000.17.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.fleW7NKwt9.exe.650000.0.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_02941281 push edx; retf 3_2_0294128E
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_02941610 push esp; retf 3_2_0294161E
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_02940790 push edi; retf 3_2_0294079A
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_0294073D push esp; retf 3_2_0294077A
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_02940F60 push edx; retf 3_2_02940F6E
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_0294109F push edx; retf 3_2_029410AE
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeCode function: 3_2_029415B1 push edx; retf 3_2_029415BE
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.928642532152079
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: 00000000.00000002.428238748.0000000002451000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.428503354.00000000024FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: fleW7NKwt9.exe PID: 6476, type: MEMORYSTR
                  Source: fleW7NKwt9.exe, 00000000.00000002.428238748.0000000002451000.00000004.00000800.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000000.00000002.428503354.00000000024FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: fleW7NKwt9.exe, 00000000.00000002.428238748.0000000002451000.00000004.00000800.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000000.00000002.428503354.00000000024FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exe TID: 6132Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: fleW7NKwt9.exe, 00000000.00000002.428503354.00000000024FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: fleW7NKwt9.exe, 00000000.00000002.428503354.00000000024FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: fleW7NKwt9.exe, 00000000.00000002.428503354.00000000024FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: fleW7NKwt9.exe, 00000003.00000002.466774937.0000000000E84000.00000004.00000020.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000000.439577366.0000000000E84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: fleW7NKwt9.exe, 00000000.00000002.428503354.00000000024FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: 3.0.fleW7NKwt9.exe.400000.4.unpack, U????/??Z??.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 3.0.fleW7NKwt9.exe.400000.4.unpack, ????A/u0032u060cufffd??.csReference to suspicious API methods: ('???A?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 3.0.fleW7NKwt9.exe.400000.8.unpack, U????/??Z??.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 3.0.fleW7NKwt9.exe.400000.8.unpack, ????A/u0032u060cufffd??.csReference to suspicious API methods: ('???A?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 3.0.fleW7NKwt9.exe.400000.14.unpack, U????/??Z??.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 3.0.fleW7NKwt9.exe.400000.14.unpack, ????A/u0032u060cufffd??.csReference to suspicious API methods: ('???A?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 3.0.fleW7NKwt9.exe.400000.6.unpack, U????/??Z??.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 3.0.fleW7NKwt9.exe.400000.6.unpack, ????A/u0032u060cufffd??.csReference to suspicious API methods: ('???A?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 3.0.fleW7NKwt9.exe.400000.10.unpack, U????/??Z??.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 3.0.fleW7NKwt9.exe.400000.10.unpack, ????A/u0032u060cufffd??.csReference to suspicious API methods: ('???A?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 3.0.fleW7NKwt9.exe.400000.12.unpack, U????/??Z??.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 3.0.fleW7NKwt9.exe.400000.12.unpack, ????A/u0032u060cufffd??.csReference to suspicious API methods: ('???A?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 3.0.fleW7NKwt9.exe.400000.16.unpack, U????/??Z??.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 3.0.fleW7NKwt9.exe.400000.16.unpack, ????A/u0032u060cufffd??.csReference to suspicious API methods: ('???A?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeProcess created: C:\Users\user\Desktop\fleW7NKwt9.exe C:\Users\user\Desktop\fleW7NKwt9.exeJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Users\user\Desktop\fleW7NKwt9.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Users\user\Desktop\fleW7NKwt9.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fleW7NKwt9.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.14.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.37c4b60.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.fleW7NKwt9.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.16.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.37c4b60.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.3731140.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.36b5b30.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.423560430.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.421990847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.444529103.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.421362580.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.466292475.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.422724141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.14.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.37c4b60.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.fleW7NKwt9.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.16.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.37c4b60.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.3731140.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.36b5b30.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.423560430.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.421990847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.444529103.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.421362580.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.466292475.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.422724141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: fleW7NKwt9.exe PID: 6476, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: fleW7NKwt9.exe PID: 1316, type: MEMORYSTR
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.14.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.37c4b60.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.fleW7NKwt9.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.16.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.37c4b60.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.3731140.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.36b5b30.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.423560430.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.421990847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.444529103.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.421362580.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.466292475.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.422724141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: fleW7NKwt9.exe PID: 6476, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: fleW7NKwt9.exe PID: 1316, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.14.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.37c4b60.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.fleW7NKwt9.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.16.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.37c4b60.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.3731140.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.36b5b30.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.423560430.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.421990847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.444529103.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.421362580.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.466292475.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.422724141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.14.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.37c4b60.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.fleW7NKwt9.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.fleW7NKwt9.exe.400000.16.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.37c4b60.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.3731140.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.fleW7NKwt9.exe.36b5b30.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.423560430.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.421990847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.444529103.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.421362580.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.466292475.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.422724141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: fleW7NKwt9.exe PID: 6476, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: fleW7NKwt9.exe PID: 1316, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts1
                  Native API
                  Path Interception11
                  Process Injection
                  1
                  Masquerading
                  1
                  Input Capture
                  111
                  Security Software Discovery
                  Remote Services1
                  Input Capture
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                  Disable or Modify Tools
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop Protocol11
                  Archive Collected Data
                  Exfiltration Over Bluetooth1
                  Ingress Tool Transfer
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
                  Virtualization/Sandbox Evasion
                  Security Account Manager31
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
                  Non-Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
                  Process Injection
                  NTDS1
                  Remote System Discovery
                  Distributed Component Object ModelInput CaptureScheduled Transfer12
                  Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Deobfuscate/Decode Files or Information
                  LSA Secrets1
                  System Network Configuration Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common2
                  Obfuscated Files or Information
                  Cached Domain Credentials12
                  System Information Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items13
                  Software Packing
                  DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  fleW7NKwt9.exe33%VirustotalBrowse
                  fleW7NKwt9.exe54%ReversingLabsByteCode-MSIL.Spyware.SnakeLogger
                  fleW7NKwt9.exe100%Joe Sandbox ML
                  No Antivirus matches
                  SourceDetectionScannerLabelLinkDownload
                  3.0.fleW7NKwt9.exe.400000.4.unpack100%AviraTR/ATRAPS.GenDownload File
                  3.0.fleW7NKwt9.exe.400000.8.unpack100%AviraTR/ATRAPS.GenDownload File
                  3.0.fleW7NKwt9.exe.400000.14.unpack100%AviraTR/ATRAPS.GenDownload File
                  3.0.fleW7NKwt9.exe.400000.6.unpack100%AviraTR/ATRAPS.GenDownload File
                  3.0.fleW7NKwt9.exe.400000.10.unpack100%AviraTR/ATRAPS.GenDownload File
                  3.0.fleW7NKwt9.exe.400000.12.unpack100%AviraTR/ATRAPS.GenDownload File
                  3.0.fleW7NKwt9.exe.400000.16.unpack100%AviraTR/ATRAPS.GenDownload File
                  3.2.fleW7NKwt9.exe.400000.0.unpack100%AviraTR/ATRAPS.GenDownload File
                  SourceDetectionScannerLabelLink
                  checkip.dyndns.com0%VirustotalBrowse
                  checkip.dyndns.org0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://checkip.dyndns.org0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://checkip.dyndns.org40%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://checkip.dyndns.org/0%URL Reputationsafe
                  http://checkip.dyndns.org/q0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://checkip.dyndns.com0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  checkip.dyndns.com
                  132.226.8.169
                  truetrueunknown
                  checkip.dyndns.org
                  unknown
                  unknowntrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://checkip.dyndns.org/true
                  • URL Reputation: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.apache.org/licenses/LICENSE-2.0fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.comfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designersGfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designers/?fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/bThefleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://api.telegram.org/botfleW7NKwt9.exe, 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designers?fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.tiro.comfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000000.00000003.385930269.0000000000AAC000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://checkip.dyndns.orgfleW7NKwt9.exe, 00000003.00000002.467045157.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000002.467289457.0000000002BE7000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designersfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.goodfont.co.krfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comlfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sajatypeworks.comfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://checkip.dyndns.org4fleW7NKwt9.exe, 00000003.00000002.467045157.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.typography.netDfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/cThefleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/staff/dennis.htmfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://fontfabrik.comfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cnfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-jones.htmlfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.org/qfleW7NKwt9.exe, 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmp, fleW7NKwt9.exe, 00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/DPleasefleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8fleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fonts.comfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.sandoll.co.krfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://checkip.dyndns.comfleW7NKwt9.exe, 00000003.00000002.467289457.0000000002BE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.urwpp.deDPleasefleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.zhongyicts.com.cnfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefleW7NKwt9.exe, 00000003.00000002.467045157.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.sakkal.comfleW7NKwt9.exe, 00000000.00000002.432034031.00000000065E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          132.226.8.169
                                          checkip.dyndns.comUnited States
                                          16989UTMEMUStrue
                                          IP
                                          192.168.2.1
                                          Joe Sandbox Version:35.0.0 Citrine
                                          Analysis ID:652387
                                          Start date and time: 26/06/202209:34:412022-06-26 09:34:41 +02:00
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 9m 32s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Sample file name:fleW7NKwt9.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:23
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.evad.winEXE@4/5@2/2
                                          EGA Information:
                                          • Successful, ratio: 50%
                                          HDC Information:
                                          • Successful, ratio: 8.8% (good quality ratio 1.6%)
                                          • Quality average: 9.6%
                                          • Quality standard deviation: 23.8%
                                          HCA Information:
                                          • Successful, ratio: 95%
                                          • Number of executed functions: 30
                                          • Number of non-executed functions: 13
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Adjust boot time
                                          • Enable AMSI
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                                          • Excluded IPs from analysis (whitelisted): 20.189.173.21
                                          • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com
                                          • Execution Graph export aborted for target fleW7NKwt9.exe, PID 1316 because it is empty
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Report size getting too big, too many NtSetInformationFile calls found.
                                          TimeTypeDescription
                                          09:36:14API Interceptor1x Sleep call for process: fleW7NKwt9.exe modified
                                          09:36:37API Interceptor1x Sleep call for process: WerFault.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          132.226.8.169t40mINaB76.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          MV CHINALAND.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          Docume001.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          Signed_PO_003485940.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          Qlo3Xd8Xt4.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          09009876543456789000000.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          Ouicbvpfj.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          SecuriteInfo.com.W32.AIDetectNet.01.12429.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          INVOICE AND UPDATTED S O A.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          CTDTOMycoF.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          PO_28001.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          SecuriteInfo.com.W32.AIDetectNet.01.10057.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          PO 326217 326214.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          uc2RxH8hO7.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          mltzDybf15.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          Atpeixzs.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          spetsifikatsioon.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          85rc53QGiJ.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          CHIOS LUCK.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          SecuriteInfo.com.W32.AIDetectNet.01.18120.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          checkip.dyndns.comHvAnUIF17C.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          fao37nt7gY.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          t40mINaB76.exeGet hashmaliciousBrowse
                                          • 132.226.8.169
                                          oAE7nqtsNA.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          0OZQi3b0tM.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          ZzO0LX45zz.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          FNK08uYGy6.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          MV CHINALAND.exeGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          Import shipment.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          4vQAHpapFz.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          SecuriteInfo.com.IL.Trojan.MSILZilla.16190.26221.exeGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          gD5LFrPtfc.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          aercUUUX2C.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          vSgQo7dqYG.exeGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          MV CHINALAND.exeGet hashmaliciousBrowse
                                          • 132.226.8.169
                                          22017_TIEM2 - RFQ.exeGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          CUSTOMER REQUEST.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          Import shipment.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          UTMEMUSfao37nt7gY.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          t40mINaB76.exeGet hashmaliciousBrowse
                                          • 132.226.8.169
                                          Import shipment.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          gD5LFrPtfc.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          MV CHINALAND.exeGet hashmaliciousBrowse
                                          • 132.226.8.169
                                          MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          Docume001.exeGet hashmaliciousBrowse
                                          • 132.226.8.169
                                          MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          m5s2c7eaZv.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          F96UcEk8Z9.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          Signed_PO_003485940.exeGet hashmaliciousBrowse
                                          • 132.226.8.169
                                          Qlo3Xd8Xt4.exeGet hashmaliciousBrowse
                                          • 132.226.8.169
                                          09009876543456789000000.exeGet hashmaliciousBrowse
                                          • 132.226.8.169
                                          Payment Copy.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          PO_28001.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          Payment Copy.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          Ouicbvpfj.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          Shipping Documents.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          SecuriteInfo.com.W32.AIDetectNet.01.12429.exeGet hashmaliciousBrowse
                                          • 132.226.8.169
                                          INVOICE AND UPDATTED S O A.exeGet hashmaliciousBrowse
                                          • 132.226.8.169
                                          No context
                                          No context
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):1.0892268191931285
                                          Encrypted:false
                                          SSDEEP:192:9hdxxiHHBUZMXSaPbqwiPZ/u7sgS274It1hV:Ldxx8BUZMXSaIPZ/u7sgX4It1h
                                          MD5:3008CD39A6E428CBC8182E96BB8D61DA
                                          SHA1:72B8BEA106B60C14F15E408FC5C63605FF31C370
                                          SHA-256:153CD6C41C776F7EF9FB1BEDCEA5609BF15B008819F178F4BA1E1B7310DAF58A
                                          SHA-512:2C7EA0ED563468204752299137E79E969F0F286D11A82EE93D6361B050CCA6F53EE9DB55E617EBDA879D928776D00E1B246D7DA9218E4F77FC6F18B459806E4D
                                          Malicious:true
                                          Reputation:low
                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.0.0.7.3.4.9.9.2.6.1.4.4.4.2.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.0.0.7.3.4.9.9.6.6.1.4.4.3.1.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.c.4.2.4.9.3.e.-.8.e.1.2.-.4.f.0.1.-.a.7.7.f.-.f.1.5.7.c.c.9.c.8.9.5.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.2.5.b.5.8.0.c.-.2.e.f.f.-.4.7.c.1.-.a.7.1.c.-.9.7.b.2.0.a.4.7.2.5.5.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.l.e.W.7.N.K.w.t.9...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.a.n.g.e.M.a.n.a...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.2.4.-.0.0.0.1.-.0.0.1.8.-.b.0.6.8.-.a.9.d.a.7.a.8.9.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.5.8.1.e.9.b.9.5.2.5.c.7.d.c.2.9.7.3.f.8.9.5.1.2.d.c.3.e.7.8.e.0.0.0.0.0.0.0.0.!.0.0.0.0.c.6.4.b.1.2.4.3.0.f.b.6.b.2.d.c.5.b.5.5.5.1.b.c.0.e.e.2.a.e.a.0.3.3.
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):6310
                                          Entropy (8bit):3.7252179392238407
                                          Encrypted:false
                                          SSDEEP:192:Rrl7r3GLNiMy67pYYE4x8SxCprW89bWJsfuym:RrlsNix6KYE42SGWifS
                                          MD5:60ED62A168EA97B1E685892E43E9B060
                                          SHA1:7F1D438937BD70B766F7AFCF48878FCD9F8EB6F6
                                          SHA-256:2FAEB348F061732352DD991CBC52DF2DBE00C4AC3F01CB77EFCCE946A9709175
                                          SHA-512:BDDAA542A1E276FFD78D7FB3EAA8B8EAEC9C1D64F9645661C55EF713E303BF9B80ACB6A99D14FC222C68D9F75961B45F821E8770DBAD2803059ECE488C22BF6F
                                          Malicious:false
                                          Reputation:low
                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.3.1.6.<./.P.i.d.>.......
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):4637
                                          Entropy (8bit):4.478963845178849
                                          Encrypted:false
                                          SSDEEP:48:cvIwSD8zsFJgtWI9l5Wgc8sqYjX8fm8M4JijFv+q8MWMUhBBrd:uITffKIgrsqY4Jk2MUhBxd
                                          MD5:3D3B3361CA85356FCE4A8478ED063D94
                                          SHA1:E38F977589DC40B06EBD66D593B958FB96716F56
                                          SHA-256:9705FD9CF7ACFCD3FC973A4796D64280696AD194739AAA0989CAF6D89E632FDD
                                          SHA-512:AD0F937E63ADA5DF7B780D58BB4D384FED49907986ED74A72B7C40C2F87CECF8E7ADE08D2F3AB122E17CEFEB0C5CB6F19C1AA54A65E857B9E14021623708C585
                                          Malicious:false
                                          Reputation:low
                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1576907" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:Mini DuMP crash report, 15 streams, Sun Jun 26 16:36:34 2022, 0x1205a4 type
                                          Category:dropped
                                          Size (bytes):265423
                                          Entropy (8bit):3.704350522574553
                                          Encrypted:false
                                          SSDEEP:3072:ZC9gIOgF5YqbA0KaF0g5UCgUU67iAsnJFoe0bjd+pnBAnAIwW:o9RpD/bA0PXTj5iXnP0kpnBU
                                          MD5:5447FC246EA9C53CE81DD32877ABDACA
                                          SHA1:7FE5EBE3A4AC71C6659E7EDB1DD6ACCBEE1A9DB6
                                          SHA-256:E424DF006EBC1B1D7C0B351E1AE1935A850A11F53D8987AD5FAA304EACD2E8C3
                                          SHA-512:A14166E3D023738CD069467C39F52C8ECBD259B4FA89F2469693E32B3631DA7B4BDE4B4C6E5826DF94705203223E58123274ABFD841E33AA6C00F26DF00A852D
                                          Malicious:false
                                          Reputation:low
                                          Preview:MDMP....... ..........b............D...............X.......<....#.......%...Q..........`.......8...........T............<..............T#..........@%...................................................................U...........B.......%......GenuineIntelW...........T.......$......b.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\fleW7NKwt9.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1216
                                          Entropy (8bit):5.355304211458859
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                          MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                          Malicious:true
                                          Reputation:high, very likely benign file
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.9231620193463135
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          • DOS Executable Generic (2002/1) 0.01%
                                          File name:fleW7NKwt9.exe
                                          File size:751616
                                          MD5:07edca391e6f402f748cb369540e7073
                                          SHA1:c64b12430fb6b2dc5b5551bc0ee2aea033aeae4f
                                          SHA256:d30687d6d06df3a60501b077b6dcfa82e3ba0c0efea48f17126e2607ce140a37
                                          SHA512:b2140eb59723b167954d3f652a3e28c0d73429c44b4966802bdcf43e55df61e554070dc54453993c977cd78ef43d12d59742b7557791ae15c463ded883d70773
                                          SSDEEP:12288:1sH2iN1kPRxliW11pyidNa+YPMjpwD1cJrl1ivBk542eIKFIe/u1KL:W13kPRrhbv6MyirlWm5eGa
                                          TLSH:CFF41286E3680DDDD1C357F51CACD1442A57F38A80ECC61AB9BA758EE5723E250A3D07
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............0..p............... ........@.. ....................................@................................
                                          Icon Hash:00828e8e8686b000
                                          Entrypoint:0x4b8fde
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x62B71CEE [Sat Jun 25 14:34:22 2022 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          dec eax
                                          push edx
                                          dec eax
                                          inc ecx
                                          xor eax, 45373434h
                                          cmp byte ptr [3534564Eh], dh
                                          xor eax, 4F373751h
                                          push esp
                                          inc ecx
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xb8f8c0x4f.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xba0000x3a0.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xbc0000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000xb6ffc0xb7000False0.921841647455601data7.928642532152079IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0xba0000x3a00x400False0.376953125data2.9217575746193245IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xbc0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountry
                                          RT_VERSION0xba0580x344data
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                          192.168.2.6132.226.8.16949769802842536 06/26/22-09:36:21.815879TCP2842536ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check4976980192.168.2.6132.226.8.169
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jun 26, 2022 09:36:21.549525023 CEST4976980192.168.2.6132.226.8.169
                                          Jun 26, 2022 09:36:21.814925909 CEST8049769132.226.8.169192.168.2.6
                                          Jun 26, 2022 09:36:21.815366983 CEST4976980192.168.2.6132.226.8.169
                                          Jun 26, 2022 09:36:21.815879107 CEST4976980192.168.2.6132.226.8.169
                                          Jun 26, 2022 09:36:22.086443901 CEST8049769132.226.8.169192.168.2.6
                                          Jun 26, 2022 09:36:25.083626986 CEST8049769132.226.8.169192.168.2.6
                                          Jun 26, 2022 09:36:25.238773108 CEST4976980192.168.2.6132.226.8.169
                                          Jun 26, 2022 09:36:40.110644102 CEST4976980192.168.2.6132.226.8.169
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jun 26, 2022 09:36:21.452459097 CEST5174853192.168.2.68.8.8.8
                                          Jun 26, 2022 09:36:21.472434998 CEST53517488.8.8.8192.168.2.6
                                          Jun 26, 2022 09:36:21.486792088 CEST6111653192.168.2.68.8.8.8
                                          Jun 26, 2022 09:36:21.505736113 CEST53611168.8.8.8192.168.2.6
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                          Jun 26, 2022 09:36:21.452459097 CEST192.168.2.68.8.8.80xa9b8Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                          Jun 26, 2022 09:36:21.486792088 CEST192.168.2.68.8.8.80x8aabStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                          Jun 26, 2022 09:36:21.472434998 CEST8.8.8.8192.168.2.60xa9b8No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                          Jun 26, 2022 09:36:21.472434998 CEST8.8.8.8192.168.2.60xa9b8No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:36:21.472434998 CEST8.8.8.8192.168.2.60xa9b8No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:36:21.472434998 CEST8.8.8.8192.168.2.60xa9b8No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:36:21.472434998 CEST8.8.8.8192.168.2.60xa9b8No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:36:21.472434998 CEST8.8.8.8192.168.2.60xa9b8No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:36:21.505736113 CEST8.8.8.8192.168.2.60x8aabNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                          Jun 26, 2022 09:36:21.505736113 CEST8.8.8.8192.168.2.60x8aabNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:36:21.505736113 CEST8.8.8.8192.168.2.60x8aabNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:36:21.505736113 CEST8.8.8.8192.168.2.60x8aabNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:36:21.505736113 CEST8.8.8.8192.168.2.60x8aabNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:36:21.505736113 CEST8.8.8.8192.168.2.60x8aabNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                          • checkip.dyndns.org
                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          0192.168.2.649769132.226.8.16980C:\Users\user\Desktop\fleW7NKwt9.exe
                                          TimestampkBytes transferredDirectionData
                                          Jun 26, 2022 09:36:21.815879107 CEST1149OUTGET / HTTP/1.1
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                          Host: checkip.dyndns.org
                                          Connection: Keep-Alive
                                          Jun 26, 2022 09:36:25.083626986 CEST1150INHTTP/1.1 504 Gateway Time-out
                                          Date: Sun, 26 Jun 2022 07:36:24 GMT
                                          Content-Type: text/html
                                          Content-Length: 557
                                          Connection: keep-alive
                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                                          Data Ascii: <html><head><title>504 Gateway Time-out</title></head><body><center><h1>504 Gateway Time-out</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:09:35:53
                                          Start date:26/06/2022
                                          Path:C:\Users\user\Desktop\fleW7NKwt9.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\fleW7NKwt9.exe"
                                          Imagebase:0xd0000
                                          File size:751616 bytes
                                          MD5 hash:07EDCA391E6F402F748CB369540E7073
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.428238748.0000000002451000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.430505969.00000000036B5000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.428503354.00000000024FF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:3
                                          Start time:09:36:15
                                          Start date:26/06/2022
                                          Path:C:\Users\user\Desktop\fleW7NKwt9.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\fleW7NKwt9.exe
                                          Imagebase:0x650000
                                          File size:751616 bytes
                                          MD5 hash:07EDCA391E6F402F748CB369540E7073
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000000.423560430.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000000.423560430.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.423560430.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000000.423560430.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000000.438756101.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000000.421990847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000000.421990847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.421990847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000000.421990847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000000.444529103.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000000.444529103.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.444529103.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000000.444529103.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000000.421362580.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000000.421362580.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.421362580.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000000.421362580.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.466292475.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000002.466292475.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.466292475.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000002.466292475.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000000.422724141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000000.422724141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.422724141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000000.422724141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          Reputation:low

                                          Target ID:10
                                          Start time:09:36:31
                                          Start date:26/06/2022
                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 1528
                                          Imagebase:0x1310000
                                          File size:434592 bytes
                                          MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Reputation:high

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:11.7%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:106
                                            Total number of Limit Nodes:9
                                            execution_graph 15285 8248040 15286 82481cb 15285->15286 15287 8248066 15285->15287 15287->15286 15289 82482c0 PostMessageW 15287->15289 15290 824832c 15289->15290 15290->15287 15291 a940d0 15292 a940e2 15291->15292 15293 a940ee 15292->15293 15297 a941e0 15292->15297 15302 a93c64 15293->15302 15295 a9410d 15298 a94205 15297->15298 15306 a942e0 15298->15306 15310 a942d0 15298->15310 15303 a93c6f 15302->15303 15318 a951a4 15303->15318 15305 a97040 15305->15295 15308 a94307 15306->15308 15307 a943e4 15307->15307 15308->15307 15314 a93de4 15308->15314 15311 a94307 15310->15311 15312 a943e4 15311->15312 15313 a93de4 CreateActCtxA 15311->15313 15312->15312 15313->15312 15315 a95370 CreateActCtxA 15314->15315 15317 a95433 15315->15317 15319 a951af 15318->15319 15322 a95b30 15319->15322 15321 a971f5 15321->15305 15323 a95b3b 15322->15323 15326 a96cc8 15323->15326 15325 a972da 15325->15321 15327 a96cd3 15326->15327 15330 a96cf8 15327->15330 15329 a973ca 15329->15325 15332 a96d03 15330->15332 15331 a97b1c 15331->15329 15332->15331 15335 a9b9f0 15332->15335 15340 a9ba00 15332->15340 15336 a9ba21 15335->15336 15337 a9ba45 15336->15337 15345 a9bcb8 15336->15345 15349 a9bcb6 15336->15349 15337->15331 15342 a9ba21 15340->15342 15341 a9ba45 15341->15331 15342->15341 15343 a9bcb8 2 API calls 15342->15343 15344 a9bcb6 2 API calls 15342->15344 15343->15341 15344->15341 15346 a9bcc5 15345->15346 15347 a9bcff 15346->15347 15353 a99ce8 15346->15353 15347->15337 15350 a9bcc5 15349->15350 15351 a9bcff 15350->15351 15352 a99ce8 2 API calls 15350->15352 15351->15337 15352->15351 15354 a99cf3 15353->15354 15356 a9c9f8 15354->15356 15357 a9c5b8 15354->15357 15356->15356 15358 a9c5c3 15357->15358 15359 a96cf8 2 API calls 15358->15359 15360 a9ca67 15359->15360 15364 a9e7d8 15360->15364 15369 a9e7f0 15360->15369 15361 a9caa0 15361->15356 15365 a9e7f0 15364->15365 15366 a9e82d 15365->15366 15367 a9ec60 LoadLibraryExW GetModuleHandleW 15365->15367 15368 a9ec70 LoadLibraryExW GetModuleHandleW 15365->15368 15366->15361 15367->15366 15368->15366 15371 a9e86d 15369->15371 15372 a9e821 15369->15372 15370 a9e82d 15370->15361 15371->15361 15372->15370 15373 a9ec60 LoadLibraryExW GetModuleHandleW 15372->15373 15374 a9ec70 LoadLibraryExW GetModuleHandleW 15372->15374 15373->15371 15374->15371 15375 a9bdd0 15376 a9be36 15375->15376 15380 a9bf81 15376->15380 15383 a9bf90 15376->15383 15377 a9bee5 15386 a99d70 15380->15386 15384 a9bfbe 15383->15384 15385 a99d70 DuplicateHandle 15383->15385 15384->15377 15385->15384 15387 a9bff8 DuplicateHandle 15386->15387 15389 a9bfbe 15387->15389 15389->15377 15390 a998d0 15394 a99dd0 15390->15394 15402 a99dc2 15390->15402 15391 a998df 15395 a99de3 15394->15395 15396 a99dfb 15395->15396 15410 a9a058 15395->15410 15414 a9a04a 15395->15414 15396->15391 15397 a99ff8 GetModuleHandleW 15399 a9a025 15397->15399 15398 a99df3 15398->15396 15398->15397 15399->15391 15403 a99de3 15402->15403 15404 a99dfb 15403->15404 15408 a9a058 LoadLibraryExW 15403->15408 15409 a9a04a LoadLibraryExW 15403->15409 15404->15391 15405 a99df3 15405->15404 15406 a99ff8 GetModuleHandleW 15405->15406 15407 a9a025 15406->15407 15407->15391 15408->15405 15409->15405 15411 a9a06c 15410->15411 15413 a9a091 15411->15413 15418 a999e8 15411->15418 15413->15398 15415 a9a06c 15414->15415 15416 a999e8 LoadLibraryExW 15415->15416 15417 a9a091 15415->15417 15416->15417 15417->15398 15419 a9a238 LoadLibraryExW 15418->15419 15421 a9a2b1 15419->15421 15421->15413

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 a99dd0-a99dd8 1 a99de3-a99de5 0->1 2 a99dde call a9894c 0->2 3 a99dfb-a99dff 1->3 4 a99de7 1->4 2->1 5 a99e01-a99e0b 3->5 6 a99e13-a99e54 3->6 55 a99ded call a9a058 4->55 56 a99ded call a9a04a 4->56 5->6 11 a99e61-a99e6f 6->11 12 a99e56-a99e5e 6->12 7 a99df3-a99df5 7->3 9 a99f30-a99f4e 7->9 28 a99f55-a99fa8 9->28 13 a99e71-a99e76 11->13 14 a99e93-a99e95 11->14 12->11 16 a99e78-a99e7f call a98958 13->16 17 a99e81 13->17 18 a99e98-a99e9f 14->18 21 a99e83-a99e91 16->21 17->21 22 a99eac-a99eb3 18->22 23 a99ea1-a99ea9 18->23 21->18 25 a99ec0-a99ec9 call a98968 22->25 26 a99eb5-a99ebd 22->26 23->22 30 a99ecb-a99ed3 25->30 31 a99ed6-a99edb 25->31 26->25 48 a99faa-a99ff0 28->48 30->31 33 a99ef9-a99f06 31->33 34 a99edd-a99ee4 31->34 41 a99f29-a99f2f 33->41 42 a99f08-a99f26 33->42 34->33 35 a99ee6-a99ef6 call a98978 call a999bc 34->35 35->33 42->41 50 a99ff8-a9a023 GetModuleHandleW 48->50 51 a99ff2-a99ff5 48->51 52 a9a02c-a9a040 50->52 53 a9a025-a9a02b 50->53 51->50 53->52 55->7 56->7
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00A9A016
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427429455.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a90000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID: p_J/
                                            • API String ID: 4139908857-2363264219
                                            • Opcode ID: e0ac20c2bf97a468e63f94daab9d69133f5001c3a71797a15b4ca623f134e50e
                                            • Instruction ID: 2ffe1cf5b2f7653a5a7a062c95ecc7a5f6e4b1fc9538e21e1835335cb61c98a0
                                            • Opcode Fuzzy Hash: e0ac20c2bf97a468e63f94daab9d69133f5001c3a71797a15b4ca623f134e50e
                                            • Instruction Fuzzy Hash: AF713470A00B059FDB24DF6AC18579BB7F1BF88304F00892EE48ADBA50DB75E9058F91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 57 a93de4-a95431 CreateActCtxA 60 a9543a-a95494 57->60 61 a95433-a95439 57->61 68 a954a3-a954a7 60->68 69 a95496-a95499 60->69 61->60 70 a954a9-a954b5 68->70 71 a954b8 68->71 69->68 70->71 73 a954b9 71->73 73->73
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 00A95421
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427429455.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a90000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID: p_J/
                                            • API String ID: 2289755597-2363264219
                                            • Opcode ID: efd7b37b806a577feef8973ea85145441518507cc4c43eeddfdb131074516b1a
                                            • Instruction ID: 05895398cae7aeacd82e413beca27fc631ad3637b1cea3d438741f2fad3bcc76
                                            • Opcode Fuzzy Hash: efd7b37b806a577feef8973ea85145441518507cc4c43eeddfdb131074516b1a
                                            • Instruction Fuzzy Hash: 5241E270D0461CCBEB25DFA9C8497CEBBF6BF88308F208469D518AB251DB756985CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 74 a9536e-a95431 CreateActCtxA 76 a9543a-a95494 74->76 77 a95433-a95439 74->77 84 a954a3-a954a7 76->84 85 a95496-a95499 76->85 77->76 86 a954a9-a954b5 84->86 87 a954b8 84->87 85->84 86->87 89 a954b9 87->89 89->89
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 00A95421
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427429455.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a90000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID: p_J/
                                            • API String ID: 2289755597-2363264219
                                            • Opcode ID: 2c8798bd34d51e903dc22c7480f6a61bbcb3bf4ce4ba83ff68c4696b3281a11a
                                            • Instruction ID: b87ce20a0d3bdcd4b6c8d9aa766e9c719e88b990b31f25ddf570b18f4e6e7712
                                            • Opcode Fuzzy Hash: 2c8798bd34d51e903dc22c7480f6a61bbcb3bf4ce4ba83ff68c4696b3281a11a
                                            • Instruction Fuzzy Hash: FD41E270D04618CBDB25CFA9C8857CEBBF6BF88308F148469D518AB251DB756986CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 90 a99d70-a9c08c DuplicateHandle 93 a9c08e-a9c094 90->93 94 a9c095-a9c0b2 90->94 93->94
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00A9BFBE,?,?,?,?,?), ref: 00A9C07F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427429455.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a90000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID: p_J/
                                            • API String ID: 3793708945-2363264219
                                            • Opcode ID: ef6d757a49f78eaaa0f7b17dc1e31c759788cd676bfe43b42b1dd65e1207f46f
                                            • Instruction ID: 55e91f217a676ea592f876baa51cab2c3a305fbfd0ccb2c6abb9f68ea7196296
                                            • Opcode Fuzzy Hash: ef6d757a49f78eaaa0f7b17dc1e31c759788cd676bfe43b42b1dd65e1207f46f
                                            • Instruction Fuzzy Hash: 2521E4B5D00208EFDF10CFAAD984ADEBBF8EB48324F14841AE914A7350D374A954CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 97 a9bff0-a9c065 99 a9c068-a9c08c DuplicateHandle 97->99 100 a9c08e-a9c094 99->100 101 a9c095-a9c0b2 99->101 100->101
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00A9BFBE,?,?,?,?,?), ref: 00A9C07F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427429455.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a90000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID: p_J/
                                            • API String ID: 3793708945-2363264219
                                            • Opcode ID: ca21bed81c7b3876a5abbdfff141930b2fe1b8f582b930f8cdb4573e177eb7f2
                                            • Instruction ID: 57e06c493377cba9160f2026cf8adc36919939d2c3f3489b5098a4c12109264e
                                            • Opcode Fuzzy Hash: ca21bed81c7b3876a5abbdfff141930b2fe1b8f582b930f8cdb4573e177eb7f2
                                            • Instruction Fuzzy Hash: CB21E2B5D00208DFDB10CFA9D584ADEBBF5AB48324F14842AE914B7310D378A944CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 112 a9a230-a9a278 113 a9a27a-a9a27d 112->113 114 a9a280-a9a2af LoadLibraryExW 112->114 113->114 115 a9a2b8-a9a2d5 114->115 116 a9a2b1-a9a2b7 114->116 116->115
                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A9A091,00000800,00000000,00000000), ref: 00A9A2A2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427429455.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a90000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID: p_J/
                                            • API String ID: 1029625771-2363264219
                                            • Opcode ID: ad33553f43426e1a26c536319fc6fc2bd8c2085ddbefcde8429d1879adffd570
                                            • Instruction ID: 3c9299b97f948afcb77f9870239a5923ed0a83e01a3ff94f8829528417b1005d
                                            • Opcode Fuzzy Hash: ad33553f43426e1a26c536319fc6fc2bd8c2085ddbefcde8429d1879adffd570
                                            • Instruction Fuzzy Hash: 691129B2D002499FDB10CF9AC484ADEFBF4EF98314F04841EE415A7610C375A945CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 104 a999e8-a9a278 106 a9a27a-a9a27d 104->106 107 a9a280-a9a2af LoadLibraryExW 104->107 106->107 108 a9a2b8-a9a2d5 107->108 109 a9a2b1-a9a2b7 107->109 109->108
                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A9A091,00000800,00000000,00000000), ref: 00A9A2A2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427429455.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a90000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID: p_J/
                                            • API String ID: 1029625771-2363264219
                                            • Opcode ID: 787cf5d02aeef0d9dd2cf1d340dcc8d1485d42b79a79b3c1110d7996634b54e9
                                            • Instruction ID: 9fff7e3e5565eff87438c94da2e0670ddf6c6f062e7768807afbcc077c1b0661
                                            • Opcode Fuzzy Hash: 787cf5d02aeef0d9dd2cf1d340dcc8d1485d42b79a79b3c1110d7996634b54e9
                                            • Instruction Fuzzy Hash: F31114B29042099FDB10CF9AC448ADEFBF4EB98324F10852AE815A7210C775A945CFA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 119 a99fb0-a99ff0 120 a99ff8-a9a023 GetModuleHandleW 119->120 121 a99ff2-a99ff5 119->121 122 a9a02c-a9a040 120->122 123 a9a025-a9a02b 120->123 121->120 123->122
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00A9A016
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427429455.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a90000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID: p_J/
                                            • API String ID: 4139908857-2363264219
                                            • Opcode ID: ad1f9546fc5a939c79d3ea8a428a8b83e91aa5eaf71124495089ba53f2ddf0a6
                                            • Instruction ID: 33d6b0794fe3edb715a1b7e343e0f336bd669047e43e475b84e460b9eb707556
                                            • Opcode Fuzzy Hash: ad1f9546fc5a939c79d3ea8a428a8b83e91aa5eaf71124495089ba53f2ddf0a6
                                            • Instruction Fuzzy Hash: 4811D2B5D002498FDB20CF9AC444BDEFBF4AB88324F14851AD829A7600D375A945CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 125 82482c0-824832a PostMessageW 126 8248333-8248347 125->126 127 824832c-8248332 125->127 127->126
                                            APIs
                                            • PostMessageW.USER32(?,?,?,?), ref: 0824831D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.433143426.0000000008240000.00000040.00000800.00020000.00000000.sdmp, Offset: 08240000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8240000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID: p_J/
                                            • API String ID: 410705778-2363264219
                                            • Opcode ID: f5992f3ad506fefb49d67aa47fd6106199251ebdaf9795da4520042c5de2fe37
                                            • Instruction ID: a38d011d72e82e3bd45c3252a47e824f3c6737cf5a14203306d5c40d155142ae
                                            • Opcode Fuzzy Hash: f5992f3ad506fefb49d67aa47fd6106199251ebdaf9795da4520042c5de2fe37
                                            • Instruction Fuzzy Hash: 0311E2B58103499FDB20CF9AD989BDEBFF8EB58324F10841AE955A7600C375A944CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 129 a9c0b9-a9c0c5 130 a9c05e 129->130 131 a9c0c7-a9c0d3 129->131 132 a9c068-a9c08c DuplicateHandle 130->132 133 a9c060-a9c065 130->133 136 a9c0de-a9c1e6 131->136 134 a9c08e-a9c094 132->134 135 a9c095-a9c0b2 132->135 133->132 134->135
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00A9BFBE,?,?,?,?,?), ref: 00A9C07F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427429455.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a90000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: b339ae84d40768e20349567dbeffb5efb9fd52a4b1dad36582549d0d705cff5b
                                            • Instruction ID: ba4005b2e65c474c4c8ec9f9be16d82974f08ccbecd3f26d436c96da04ab4c95
                                            • Opcode Fuzzy Hash: b339ae84d40768e20349567dbeffb5efb9fd52a4b1dad36582549d0d705cff5b
                                            • Instruction Fuzzy Hash: 95415C78E803409FEB009FA0E44977A7FB9FB98350F14842AE9059B796D7B48C15CF51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427098464.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a3d000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9fb44c0381cd26ad0a46b90235a2e1df9be3975f2089e634bb740e15d6155750
                                            • Instruction ID: a4dd7490353dfe9d17aa68c5df210d1449691d5c2724b26d4eb5a43c6b2f0773
                                            • Opcode Fuzzy Hash: 9fb44c0381cd26ad0a46b90235a2e1df9be3975f2089e634bb740e15d6155750
                                            • Instruction Fuzzy Hash: BA2137B1504204EFDB01CF14E9C0B26BB75FB98324F24C569F9094B246C336E856CBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427206338.0000000000A4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A4D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a4d000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7dd901755ccd914e45a50623625dac7da9c712fb007981c88255fa3eef363461
                                            • Instruction ID: 60b38aa911996a17321297a432c8c472ccaf1746da593722008840fac29308db
                                            • Opcode Fuzzy Hash: 7dd901755ccd914e45a50623625dac7da9c712fb007981c88255fa3eef363461
                                            • Instruction Fuzzy Hash: A82107B9504204EFDB01CF24D5C4B66BBA5FBC4318F24CA6DE9095B346C3B6D846CB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427206338.0000000000A4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A4D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a4d000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bf84078d39f6f4bb48fbd9fd75eca08aa5da61f751e50ec2443f5886ee8de203
                                            • Instruction ID: 63bbe9aa6ddd51520f31bdebb37b06a493af71a0643a131b04fe8bcfb2e3531d
                                            • Opcode Fuzzy Hash: bf84078d39f6f4bb48fbd9fd75eca08aa5da61f751e50ec2443f5886ee8de203
                                            • Instruction Fuzzy Hash: 8421F279508244EFCB14CF24D9C4B26BBA5FBC4318F24C9A9D90A4B246C33AD847CB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427098464.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a3d000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f9fda02216d3fd5d649f56d7b3284611b664a798601c395269b298946f43e6ab
                                            • Instruction ID: a9478c8fcf5ba7d023d8edd5fdce25d1ad9bb02a5048de4a3f9600c12af3d1e3
                                            • Opcode Fuzzy Hash: f9fda02216d3fd5d649f56d7b3284611b664a798601c395269b298946f43e6ab
                                            • Instruction Fuzzy Hash: E511E676404280DFCF12CF10E5C4B16BF71FB94324F24C6A9E8490B656C33AE856CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427206338.0000000000A4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A4D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a4d000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1f9acdc0b4809e63da601f9f1ec34a5598f6a4be3edce778ea82f650c00e25d7
                                            • Instruction ID: 22f497a6ad9be3a304a3fc551026df39389db2738c44f10d1bbd07c8fb4cf633
                                            • Opcode Fuzzy Hash: 1f9acdc0b4809e63da601f9f1ec34a5598f6a4be3edce778ea82f650c00e25d7
                                            • Instruction Fuzzy Hash: 83118B79504280DFCB15CF14D5C4B15BBA1FB85324F28C6AAD84A4B656C33AD85BCBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427206338.0000000000A4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A4D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a4d000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1f9acdc0b4809e63da601f9f1ec34a5598f6a4be3edce778ea82f650c00e25d7
                                            • Instruction ID: 98b15f6e82525686a60f261c5ae883928275e1303e01b70cb426cd1a4e9d8e47
                                            • Opcode Fuzzy Hash: 1f9acdc0b4809e63da601f9f1ec34a5598f6a4be3edce778ea82f650c00e25d7
                                            • Instruction Fuzzy Hash: AE119A79904280DFCB12CF10D5C4B55FBB1FB84324F28C6AED8494B696C37AD85ACB62
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427098464.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a3d000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 947846f7b9ebe944c8b3cb787ad7bdfa1f70f3181b35b7231decfdedb1bbf9fa
                                            • Instruction ID: efb805daf52a8c6e2c457ae2481241b25c345b7c2a3a786d37a4bebafab01883
                                            • Opcode Fuzzy Hash: 947846f7b9ebe944c8b3cb787ad7bdfa1f70f3181b35b7231decfdedb1bbf9fa
                                            • Instruction Fuzzy Hash: 5201F271408384DAE7208B26EC88B66BBA8EF51368F18C51AFE145A346D3799840CAB1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427098464.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a3d000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 651036079d7195622d7e4bbc03b3eef3c697ab8ea14a210de11171ad07eb5c33
                                            • Instruction ID: 5663157e7486ef873ac293a3e5f6ea9590dc0012b8dc55399d2a99b338de1364
                                            • Opcode Fuzzy Hash: 651036079d7195622d7e4bbc03b3eef3c697ab8ea14a210de11171ad07eb5c33
                                            • Instruction Fuzzy Hash: FBF062714042849AE7108F15DCC8B62FB98EB51774F18C45AFD085F386C3799C44CAB1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.433143426.0000000008240000.00000040.00000800.00020000.00000000.sdmp, Offset: 08240000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8240000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: '
                                            • API String ID: 0-1997036262
                                            • Opcode ID: ac01b1d6d3bc94fa705d337692f8bd9a604329806a76e4becb83d3ad823d2d9e
                                            • Instruction ID: 642b7cc0c8ef966757c3578988ac46830e226286990c05ea6f852f34bf9d94fc
                                            • Opcode Fuzzy Hash: ac01b1d6d3bc94fa705d337692f8bd9a604329806a76e4becb83d3ad823d2d9e
                                            • Instruction Fuzzy Hash: BE414571D15A588BEB5CCF6BCD4079EFAF7AFC8201F14D1BA891DAA215DB7005828F11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427429455.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a90000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f1cfe10d3bcafe9c897487fc726bd77a36d23e2d996934afb6b94803d61a6193
                                            • Instruction ID: f23c661314c5b82e9df6a64742c019d6c3d6bb85ac3ad6903653c5cb6475430a
                                            • Opcode Fuzzy Hash: f1cfe10d3bcafe9c897487fc726bd77a36d23e2d996934afb6b94803d61a6193
                                            • Instruction Fuzzy Hash: 6212C5F1E917469BD310CFA5F59C18A7BA0B744328BD04A08D2622EED6D7B8117ECF84
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427429455.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a90000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 06fa1192fbb78756e259fd0d6d426ee2b1cc6f24783144c3808e183785986edd
                                            • Instruction ID: 79e34ef20e817cca31a09b4c69c1771defa3501bc4f0b74391187e6df7854a7a
                                            • Opcode Fuzzy Hash: 06fa1192fbb78756e259fd0d6d426ee2b1cc6f24783144c3808e183785986edd
                                            • Instruction Fuzzy Hash: 6CA16C36F006198FCF05DFB5D9449AEBBF2FF85300B15856AE805BB261EB31A955CB40
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.427429455.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a90000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 33b8025b0be956856c3be84096bdc7a6c41dd941a1d9e001bcbff1d132398e29
                                            • Instruction ID: 01efe9513d247428f3874ba2cab9ca60b66a2d936db1e4b15318a0a5c67eb2d8
                                            • Opcode Fuzzy Hash: 33b8025b0be956856c3be84096bdc7a6c41dd941a1d9e001bcbff1d132398e29
                                            • Instruction Fuzzy Hash: 6FC10CB1E917469BD710CFA5F98C18A7B61BB45328F904A09D1622FED2D7B8107ECF84
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.433143426.0000000008240000.00000040.00000800.00020000.00000000.sdmp, Offset: 08240000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8240000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0cbcdd7528543bcfcbedea856aa525d62d7636747103fd0bd16efefaa6b4aecd
                                            • Instruction ID: 2fe1c62f1593357276e02525b504e64858f3f727f156be78d8cad0210c0ef0c8
                                            • Opcode Fuzzy Hash: 0cbcdd7528543bcfcbedea856aa525d62d7636747103fd0bd16efefaa6b4aecd
                                            • Instruction Fuzzy Hash: B5418D71D15B598FEB1DCF6B8C0028AFBF3AFC5201F18C5BA844CAA125EB3409868F11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.426092818.00000000000D2000.00000002.00000001.01000000.00000003.sdmp, Offset: 000D0000, based on PE: true
                                            • Associated: 00000000.00000002.426060428.00000000000D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.426327112.000000000018A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d0000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ce78df237b3a8992cdbcbd0fa366bb7fd97de0b5cbbffafc5ff72cc84acf6f12
                                            • Instruction ID: 7af75577dc41691f84992ce2c2e9d93e874b1e4aff24801fbf5c1c984dde3d8b
                                            • Opcode Fuzzy Hash: ce78df237b3a8992cdbcbd0fa366bb7fd97de0b5cbbffafc5ff72cc84acf6f12
                                            • Instruction Fuzzy Hash: C501DA7B25106E2D23161D2B9C0ADE7771FF3D7626319836EA464C7541CE21982A46F1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.426092818.00000000000D2000.00000002.00000001.01000000.00000003.sdmp, Offset: 000D0000, based on PE: true
                                            • Associated: 00000000.00000002.426060428.00000000000D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.426327112.000000000018A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d0000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5cbff11a313984514ca3e74b79423793c6d3c4b1c58cfafff5bda6aa9b8589c0
                                            • Instruction ID: 1b3fcc1a5b263608617a119ea21e60ce28c884a658aff6e20868ccabc1cbbb25
                                            • Opcode Fuzzy Hash: 5cbff11a313984514ca3e74b79423793c6d3c4b1c58cfafff5bda6aa9b8589c0
                                            • Instruction Fuzzy Hash: 86F0F97B3950366D730609ABEC06CDF930BB2C89B73064536AA69CB681DF6098170AE1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.426092818.00000000000D2000.00000002.00000001.01000000.00000003.sdmp, Offset: 000D0000, based on PE: true
                                            • Associated: 00000000.00000002.426060428.00000000000D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.426327112.000000000018A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d0000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b17b3da307a719ae41495fe04d3e234adab7892b4f984f966fd2978b8f6b1653
                                            • Instruction ID: a7f7dbd8b7edcbd4e705570e5e955ee112d1dca211c55c482b2d95f071fd7bf5
                                            • Opcode Fuzzy Hash: b17b3da307a719ae41495fe04d3e234adab7892b4f984f966fd2978b8f6b1653
                                            • Instruction Fuzzy Hash: 69F0B07B39203E2D73062D1A5D06EF7A30FB3CA21A305527EA569C7642DF61591B05E1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.426092818.00000000000D2000.00000002.00000001.01000000.00000003.sdmp, Offset: 000D0000, based on PE: true
                                            • Associated: 00000000.00000002.426060428.00000000000D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.426327112.000000000018A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d0000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 286e34843c94ac1d62b3d97014096ed1116d8e4c7c11cc4cfb05e8402a665e94
                                            • Instruction ID: 2d9796076996c65a6aeeef6b4aa8bd8c1352221e20d8d15838b471dcf883dc98
                                            • Opcode Fuzzy Hash: 286e34843c94ac1d62b3d97014096ed1116d8e4c7c11cc4cfb05e8402a665e94
                                            • Instruction Fuzzy Hash: D5F0F2B3808045F4231309778C08CB73C2B56EDBB113B832A7838FB8506EBA8813F160
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.426092818.00000000000D2000.00000002.00000001.01000000.00000003.sdmp, Offset: 000D0000, based on PE: true
                                            • Associated: 00000000.00000002.426060428.00000000000D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.426327112.000000000018A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d0000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f8f5fcfc862a104ba4029f2bc8638bf6334d1baa3923bdafcfbdc46a35f17e39
                                            • Instruction ID: b73243f0bcac1b6ad19ee4343c7829361b55f8f546e21436ca92eb4f3d249666
                                            • Opcode Fuzzy Hash: f8f5fcfc862a104ba4029f2bc8638bf6334d1baa3923bdafcfbdc46a35f17e39
                                            • Instruction Fuzzy Hash: 0801F7B3544096F8272308679C08C573D2BA2ED7B133B533A7839DB591EEB98813E1A0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.426092818.00000000000D2000.00000002.00000001.01000000.00000003.sdmp, Offset: 000D0000, based on PE: true
                                            • Associated: 00000000.00000002.426060428.00000000000D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.426327112.000000000018A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d0000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bc1474f2b50bc3f320c71d3f2eab81c655f5026dea309a5f3a2ec255acf37b97
                                            • Instruction ID: d39b1f93d7ce98fcb7f6690928015cc3b2b5a90080cd893ffbd48f2f34c28e4e
                                            • Opcode Fuzzy Hash: bc1474f2b50bc3f320c71d3f2eab81c655f5026dea309a5f3a2ec255acf37b97
                                            • Instruction Fuzzy Hash: 2CF0FFA9348191FE4723447BEC2CEC73C1795D97B033D02397C5197443FA9A8E15C950
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.426092818.00000000000D2000.00000002.00000001.01000000.00000003.sdmp, Offset: 000D0000, based on PE: true
                                            • Associated: 00000000.00000002.426060428.00000000000D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.426327112.000000000018A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d0000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 28bc95c38097d73ddbc0da32f30e895189af898fdc165d265fd7d3702bdecd92
                                            • Instruction ID: 2ce3348e2222c9aa7edd32bec7737f31235e9faec7fb72b79c420e80c17b16c5
                                            • Opcode Fuzzy Hash: 28bc95c38097d73ddbc0da32f30e895189af898fdc165d265fd7d3702bdecd92
                                            • Instruction Fuzzy Hash: B4F0963E398166DE87529C7FFC2CA8F6616E5D197271C4637BE10C7083EA228917C9B0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.426092818.00000000000D2000.00000002.00000001.01000000.00000003.sdmp, Offset: 000D0000, based on PE: true
                                            • Associated: 00000000.00000002.426060428.00000000000D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.426327112.000000000018A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d0000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f76355e381a2ea839e7b8fb505e99b4bedc0f948530b5095bcafabcf88b7286
                                            • Instruction ID: dac8629c03bd131ff1873bd0fd106a6bf41fda630d1fa724e731dbc9bccbda74
                                            • Opcode Fuzzy Hash: 3f76355e381a2ea839e7b8fb505e99b4bedc0f948530b5095bcafabcf88b7286
                                            • Instruction Fuzzy Hash: BAF05A3780C200C5230203FB1A0A562826612E36F1137C3300C3EFA9929CAB4803B890
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000003.00000002.466898526.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_2940000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c435a630b75f29181f229f7c16ac8c2a604df691430c4035a154081ecf9f194a
                                            • Instruction ID: 68e5702c3f054d4541f6805d36801b898b23567d1679fe04dd5520eef1f19635
                                            • Opcode Fuzzy Hash: c435a630b75f29181f229f7c16ac8c2a604df691430c4035a154081ecf9f194a
                                            • Instruction Fuzzy Hash: 17E16134F042148FCB18DF78D958AAEBBB6BF89304B158869E906EB354DF359C02CB55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000003.00000002.466898526.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_2940000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ec84866cdfe6d51b10d7202624fd2fc537560983d8ea01e86ff3f9be16470a23
                                            • Instruction ID: e4fa476637955042ea6abacd99d8a6ea6665a4fa14f4794464c5bfb52970fc43
                                            • Opcode Fuzzy Hash: ec84866cdfe6d51b10d7202624fd2fc537560983d8ea01e86ff3f9be16470a23
                                            • Instruction Fuzzy Hash: A0B1E278900209CFCB45EFA4E99499DB7B2FF44308F148925E509EB768EB306D45CF95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000003.00000002.466898526.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_2940000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 15e9956a0df01f10cc67e40f4de54260a0ff190ba7eb30aa8df950788cc40ebd
                                            • Instruction ID: 57e8ab9ad17481864d7f6bbd04d43c6fe3c82c53f4fa06fb19d006f1c9f0a4fe
                                            • Opcode Fuzzy Hash: 15e9956a0df01f10cc67e40f4de54260a0ff190ba7eb30aa8df950788cc40ebd
                                            • Instruction Fuzzy Hash: 6CB1E278900209CFCB45EFA4E99499DB7B2FF84308F148929E509EB768EB306D45CF95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000003.00000002.466898526.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_2940000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e2f3ea79af51fe4666e8436d4558b139689fdb668467d8ae09c590a7c8af98df
                                            • Instruction ID: cbb99e4f982c036c8cd3af2bf33230e383716453dc4a3da875db7a963d431e56
                                            • Opcode Fuzzy Hash: e2f3ea79af51fe4666e8436d4558b139689fdb668467d8ae09c590a7c8af98df
                                            • Instruction Fuzzy Hash: 8E519478E01208DFCB18DFB5D98499DBBF2FF89304B209569E805AB364DB35A941CF54
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000003.00000002.466898526.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_2940000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f556d7c002120609eea9a725d1602146f552335b17385c04a0d80946856a92f1
                                            • Instruction ID: 0f9c97c3bbebf7b9154a6b42cdc80ca838ca24dad47752e0d6c0457ca8e5a475
                                            • Opcode Fuzzy Hash: f556d7c002120609eea9a725d1602146f552335b17385c04a0d80946856a92f1
                                            • Instruction Fuzzy Hash: 5E310535F042158BDB284FB6499477EB6AABB86248F18443EFD06C7380DFB5C944D751
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000003.00000002.466898526.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_2940000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: de010ede9ca36016c082a97f7c2eb29ab5222164320294b78238a458ea600f74
                                            • Instruction ID: 3167458e975b48742a674724484cdbba3792859c6050db3cb47b7a4d47ec4687
                                            • Opcode Fuzzy Hash: de010ede9ca36016c082a97f7c2eb29ab5222164320294b78238a458ea600f74
                                            • Instruction Fuzzy Hash: 73218135A101049FCF14DB64C548EEE77A9FF89768B50C51AE8199B744EF30FA4A8BD0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000003.00000002.466591471.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_cad000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 749623583674abba0cc54d2b5834b03f5221d253dc8ba91fe9c58a10fbef56ff
                                            • Instruction ID: 39316f9f05588b84558036d26b7ec6a6973ab343ba76b62b4de39aab75bc421f
                                            • Opcode Fuzzy Hash: 749623583674abba0cc54d2b5834b03f5221d253dc8ba91fe9c58a10fbef56ff
                                            • Instruction Fuzzy Hash: 0A2145F1904205DFCB01DF10D9C4B26BFA1FB9932CF2089A9E8074B606C336D946DBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000003.00000002.466898526.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_2940000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ae4799a15f26db51d970c47d9d35af25cf79b29a3435375bceec8f231f322a88
                                            • Instruction ID: 1d7a01e6fee9f6777b9e18e8791dc9d44e6ccb70904fbd9cb9ab7d67c65885f6
                                            • Opcode Fuzzy Hash: ae4799a15f26db51d970c47d9d35af25cf79b29a3435375bceec8f231f322a88
                                            • Instruction Fuzzy Hash: A4319578E01309DFCB44DFA4DA9489DBBB2FF49308B208569E81AAB764D731AD05CF50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000003.00000002.466591471.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_cad000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f9fda02216d3fd5d649f56d7b3284611b664a798601c395269b298946f43e6ab
                                            • Instruction ID: 6470ca6709a272dde093ff543d1fb75fdbe772ca6dfdefe02a34392f61703c4a
                                            • Opcode Fuzzy Hash: f9fda02216d3fd5d649f56d7b3284611b664a798601c395269b298946f43e6ab
                                            • Instruction Fuzzy Hash: 0011E6B6804284CFCF11CF10D5C4B16BF71FB85328F24C6A9D8060B656C336D95ACBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000003.00000002.466898526.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_2940000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 135810d6aea75d3321e9fcf7ae3fd23f468985927e0fc0b9345d673a55d69809
                                            • Instruction ID: ff45c8157a084a73978e36b68da53dd48706c5ade92b135236881c1d06095594
                                            • Opcode Fuzzy Hash: 135810d6aea75d3321e9fcf7ae3fd23f468985927e0fc0b9345d673a55d69809
                                            • Instruction Fuzzy Hash: E711BB74C142098FCB04EFA9D9485EEBFF0FB09300F10566AD809B3254EB305A95CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000003.00000002.466898526.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_2940000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3567fa7329f47464966d25364002e54899f532b5e8214f4fa155004ed62e6916
                                            • Instruction ID: 2ac2a5f123b8ead6cc4a25cb6ff06b6dd351246aebc8755b7bf86704fdc670ba
                                            • Opcode Fuzzy Hash: 3567fa7329f47464966d25364002e54899f532b5e8214f4fa155004ed62e6916
                                            • Instruction Fuzzy Hash: 23E0D835C103695FC711AFA09CA94DFBF38EEA7315F459192D41037640EB302A1D87A1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000003.00000002.466898526.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_2940000_fleW7NKwt9.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7da1c7cd72c205993b8fc50b349835800a1957b2b0dd409b6a74a1ff103ed94f
                                            • Instruction ID: 8600394dc2d5c953c9eb1d5853ffe99df60ee08421c470f27a77d8bd3661ccf8
                                            • Opcode Fuzzy Hash: 7da1c7cd72c205993b8fc50b349835800a1957b2b0dd409b6a74a1ff103ed94f
                                            • Instruction Fuzzy Hash: F1D01231D2022D578B04ABA5DD484DEB738EE95225B504626D52437640AB70265D86A1
                                            Uniqueness

                                            Uniqueness Score: -1.00%