Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Document.exe

Overview

General Information

Sample Name:Document.exe
Analysis ID:680351
MD5:7ed91a8a05d340670440c48390aaba1c
SHA1:370e2c4ed3a4ff0f6fc6bc6d634ad29d7690ae0a
SHA256:7e525faf627cca0905153e9ab2d1308006466097a041395573e2ff31c58b69a7
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • Document.exe (PID: 5756 cmdline: "C:\Users\user\Desktop\Document.exe" MD5: 7ED91A8A05D340670440C48390AABA1C)
    • Document.exe (PID: 5156 cmdline: C:\Users\user\Desktop\Document.exe MD5: 7ED91A8A05D340670440C48390AABA1C)
    • Document.exe (PID: 4140 cmdline: C:\Users\user\Desktop\Document.exe MD5: 7ED91A8A05D340670440C48390AABA1C)
    • Document.exe (PID: 5076 cmdline: C:\Users\user\Desktop\Document.exe MD5: 7ED91A8A05D340670440C48390AABA1C)
    • Document.exe (PID: 6128 cmdline: C:\Users\user\Desktop\Document.exe MD5: 7ED91A8A05D340670440C48390AABA1C)
  • InxbcD.exe (PID: 2136 cmdline: "C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe" MD5: 7ED91A8A05D340670440C48390AABA1C)
    • InxbcD.exe (PID: 4684 cmdline: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe MD5: 7ED91A8A05D340670440C48390AABA1C)
    • InxbcD.exe (PID: 3396 cmdline: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe MD5: 7ED91A8A05D340670440C48390AABA1C)
  • InxbcD.exe (PID: 5532 cmdline: "C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe" MD5: 7ED91A8A05D340670440C48390AABA1C)
    • InxbcD.exe (PID: 1656 cmdline: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe MD5: 7ED91A8A05D340670440C48390AABA1C)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "moni@seara-br.co", "Password": "eTLvLmQ0", "Host": "us2.smtp.mailhostbox.com"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.284409305.0000000002533000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000000.00000002.286387486.000000000277A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000012.00000002.356439070.0000000002E2A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Click to see the 23 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Document.exe.3655e58.6.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.Document.exe.3655e58.6.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.Document.exe.3655e58.6.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x30c9c:$s10: logins
                • 0x30703:$s11: credential
                • 0x2cce8:$g1: get_Clipboard
                • 0x2ccf6:$g2: get_Keyboard
                • 0x2cd03:$g3: get_Password
                • 0x2dfe2:$g4: get_CtrlKeyDown
                • 0x2dff2:$g5: get_ShiftKeyDown
                • 0x2e003:$g6: get_AltKeyDown
                0.2.Document.exe.3655e58.6.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
                • 0x2e3bf:$a13: get_DnsResolver
                • 0x2cbe1:$a20: get_LastAccessed
                • 0x2ed69:$a27: set_InternalServerPort
                • 0x2f082:$a30: set_GuidMasterKey
                • 0x2cce8:$a33: get_Clipboard
                • 0x2ccf6:$a34: get_Keyboard
                • 0x2dff2:$a35: get_ShiftKeyDown
                • 0x2e003:$a36: get_AltKeyDown
                • 0x2cd03:$a37: get_Password
                • 0x2d7a2:$a38: get_PasswordHash
                • 0x2e7d7:$a39: get_DefaultCredentials
                0.2.Document.exe.3621838.7.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  Click to see the 22 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Document.exeVirustotal: Detection: 28%Perma Link
                  Source: Document.exeReversingLabs: Detection: 17%
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeVirustotal: Detection: 28%Perma Link
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeReversingLabs: Detection: 17%
                  Source: Document.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeJoe Sandbox ML: detected
                  Source: 8.0.Document.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: 0.2.Document.exe.3621838.7.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "moni@seara-br.co", "Password": "eTLvLmQ0", "Host": "us2.smtp.mailhostbox.com"}
                  Source: Document.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Document.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Joe Sandbox ViewIP Address: 208.91.198.143 208.91.198.143
                  Source: Joe Sandbox ViewIP Address: 208.91.199.225 208.91.199.225
                  Source: global trafficTCP traffic: 192.168.2.3:49744 -> 208.91.199.225:587
                  Source: global trafficTCP traffic: 192.168.2.3:49780 -> 208.91.198.143:587
                  Source: global trafficTCP traffic: 192.168.2.3:49744 -> 208.91.199.225:587
                  Source: global trafficTCP traffic: 192.168.2.3:49780 -> 208.91.198.143:587
                  Source: InxbcD.exe, 00000019.00000002.552920598.0000000002D0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://0PYcqQo9t3HlEFYDO.org
                  Source: Document.exe, 00000008.00000002.527070208.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.524941648.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                  Source: InxbcD.exe, 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                  Source: InxbcD.exe, 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://JaRAdc.com
                  Source: Document.exe, 00000008.00000002.568031255.0000000006872000.00000004.00000800.00020000.00000000.sdmp, Document.exe, 00000008.00000002.551388083.000000000363F000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.550192268.0000000002F20000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.522158378.0000000000E12000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.523803830.0000000000DD4000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.572962420.0000000006680000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.553154806.0000000002D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: Document.exe, 00000008.00000002.568031255.0000000006872000.00000004.00000800.00020000.00000000.sdmp, Document.exe, 00000008.00000002.551388083.000000000363F000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.550192268.0000000002F20000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.522158378.0000000000E12000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000003.434924430.0000000000E25000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.523803830.0000000000DD4000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.572962420.0000000006680000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.553154806.0000000002D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: Document.exe, 00000008.00000002.568031255.0000000006872000.00000004.00000800.00020000.00000000.sdmp, Document.exe, 00000008.00000002.551388083.000000000363F000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.520740305.0000000000DD6000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.550192268.0000000002F20000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.522158378.0000000000E12000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.523803830.0000000000DD4000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.572962420.0000000006680000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.553154806.0000000002D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: Document.exe, 00000008.00000002.568031255.0000000006872000.00000004.00000800.00020000.00000000.sdmp, Document.exe, 00000008.00000002.551388083.000000000363F000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.550192268.0000000002F20000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.522158378.0000000000E12000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.523803830.0000000000DD4000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.572962420.0000000006680000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.553154806.0000000002D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: Document.exe, 00000008.00000002.568031255.0000000006872000.00000004.00000800.00020000.00000000.sdmp, Document.exe, 00000008.00000002.551388083.000000000363F000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.520740305.0000000000DD6000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.550192268.0000000002F20000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.522158378.0000000000E12000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.523803830.0000000000DD4000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.572962420.0000000006680000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.553154806.0000000002D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0A
                  Source: Document.exe, 00000008.00000002.551388083.000000000363F000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.550192268.0000000002F20000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.553154806.0000000002D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: Document.exe, 00000008.00000002.527070208.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.524941648.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
                  Source: InxbcD.exe, 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%appdata
                  Source: Document.exe, 00000008.00000002.568031255.0000000006872000.00000004.00000800.00020000.00000000.sdmp, Document.exe, 00000008.00000002.551388083.000000000363F000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.520740305.0000000000DD6000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.550192268.0000000002F20000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.522158378.0000000000E12000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.523803830.0000000000DD4000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.572962420.0000000006680000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.553154806.0000000002D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                  Source: Document.exe, 00000008.00000002.527070208.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.524941648.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                  Source: unknownDNS traffic detected: queries for: us2.smtp.mailhostbox.com
                  Source: Document.exe, 00000000.00000002.282769256.000000000084A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                  System Summary

                  barindex
                  Source: 0.2.Document.exe.3655e58.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.Document.exe.3655e58.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.Document.exe.3621838.7.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.Document.exe.3621838.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 8.0.Document.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 8.0.Document.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.Document.exe.3655e58.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.Document.exe.3655e58.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 0.2.Document.exe.3655e58.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.Document.exe.3621838.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.Document.exe.3621838.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 0.2.Document.exe.3621838.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.Document.exe.35eb418.5.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.Document.exe.35eb418.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 0.2.Document.exe.35eb418.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 00000000.00000002.287031983.00000000035EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 00000008.00000000.279787688.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: Process Memory Space: Document.exe PID: 5756, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: Process Memory Space: Document.exe PID: 6128, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: initial sampleStatic PE information: Filename: Document.exe
                  Source: 8.0.Document.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bFCF6A7EFu002dE33Du002d41C2u002d9629u002d029E9E3D636Cu007d/u0031C7F1875u002dA384u002d4590u002dB87Fu002d2AF74FE81805.csLarge array initialization: .cctor: array initializer size 11586
                  Source: Document.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0.2.Document.exe.3655e58.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.Document.exe.3655e58.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.Document.exe.3621838.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.Document.exe.3621838.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 8.0.Document.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 8.0.Document.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.Document.exe.3655e58.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.Document.exe.3655e58.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 0.2.Document.exe.3655e58.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.Document.exe.3621838.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.Document.exe.3621838.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 0.2.Document.exe.3621838.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.Document.exe.35eb418.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.Document.exe.35eb418.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 0.2.Document.exe.35eb418.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 00000000.00000002.287031983.00000000035EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 00000008.00000000.279787688.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: Process Memory Space: Document.exe PID: 5756, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: Process Memory Space: Document.exe PID: 6128, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: Process Memory Space: InxbcD.exe PID: 2136, type: MEMORYSTRMatched rule: webshell_jsp_generic_base64 date = 2021/01/24, author = Arnim Rupp, description = Generic JSP webshell with base64 encoded payload, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 1b916afdd415dfa4e77cecf47321fd676ba2184d
                  Source: C:\Users\user\Desktop\Document.exeCode function: 0_2_0082CD04
                  Source: C:\Users\user\Desktop\Document.exeCode function: 0_2_0082F0C0
                  Source: C:\Users\user\Desktop\Document.exeCode function: 0_2_0082F0D0
                  Source: C:\Users\user\Desktop\Document.exeCode function: 0_2_06A641D0
                  Source: C:\Users\user\Desktop\Document.exeCode function: 0_2_06A64F28
                  Source: C:\Users\user\Desktop\Document.exeCode function: 0_2_06C95E20
                  Source: C:\Users\user\Desktop\Document.exeCode function: 0_2_06C955EF
                  Source: C:\Users\user\Desktop\Document.exeCode function: 0_2_06C955F8
                  Source: C:\Users\user\Desktop\Document.exeCode function: 0_2_06C96F8B
                  Source: C:\Users\user\Desktop\Document.exeCode function: 0_2_06C96F90
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_0172D976
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_0172E16A
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_0172DA00
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_01AAF380
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_01AA6560
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_01AACBE4
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_01AA9148
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_01AAF6C8
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DBC58
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DC9B8
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063D0040
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063D2120
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_06C976A0
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_06C9C8F0
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_06C951C8
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_06C991E8
                  Source: Document.exe, 00000000.00000000.244793166.00000000000EC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDefaultInterfaceAttrib.exeB vs Document.exe
                  Source: Document.exe, 00000000.00000002.284409305.0000000002533000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamejRrTgBXmkjdDgcSwGGtWZglDX.exe4 vs Document.exe
                  Source: Document.exe, 00000000.00000002.287031983.00000000035EB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamejRrTgBXmkjdDgcSwGGtWZglDX.exe4 vs Document.exe
                  Source: Document.exe, 00000000.00000002.287031983.00000000035EB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs Document.exe
                  Source: Document.exe, 00000000.00000002.293047297.0000000006A40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs Document.exe
                  Source: Document.exe, 00000000.00000002.293486106.0000000006A90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs Document.exe
                  Source: Document.exe, 00000000.00000002.294316380.0000000006C00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs Document.exe
                  Source: Document.exe, 00000000.00000003.266214981.00000000008D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs Document.exe
                  Source: Document.exe, 00000000.00000002.282769256.000000000084A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Document.exe
                  Source: Document.exe, 00000008.00000002.512171516.0000000001338000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Document.exe
                  Source: Document.exe, 00000008.00000003.285724716.0000000006851000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDefaultInterfaceAttrib.exeB vs Document.exe
                  Source: Document.exe, 00000008.00000000.280155479.0000000000436000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamejRrTgBXmkjdDgcSwGGtWZglDX.exe4 vs Document.exe
                  Source: Document.exeBinary or memory string: OriginalFilenameDefaultInterfaceAttrib.exeB vs Document.exe
                  Source: Document.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: InxbcD.exe.8.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: Document.exeVirustotal: Detection: 28%
                  Source: Document.exeReversingLabs: Detection: 17%
                  Source: C:\Users\user\Desktop\Document.exeFile read: C:\Users\user\Desktop\Document.exeJump to behavior
                  Source: Document.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\Document.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: unknownProcess created: C:\Users\user\Desktop\Document.exe "C:\Users\user\Desktop\Document.exe"
                  Source: C:\Users\user\Desktop\Document.exeProcess created: C:\Users\user\Desktop\Document.exe C:\Users\user\Desktop\Document.exe
                  Source: C:\Users\user\Desktop\Document.exeProcess created: C:\Users\user\Desktop\Document.exe C:\Users\user\Desktop\Document.exe
                  Source: C:\Users\user\Desktop\Document.exeProcess created: C:\Users\user\Desktop\Document.exe C:\Users\user\Desktop\Document.exe
                  Source: C:\Users\user\Desktop\Document.exeProcess created: C:\Users\user\Desktop\Document.exe C:\Users\user\Desktop\Document.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe "C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe "C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe"
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess created: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess created: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess created: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                  Source: C:\Users\user\Desktop\Document.exeProcess created: C:\Users\user\Desktop\Document.exe C:\Users\user\Desktop\Document.exe
                  Source: C:\Users\user\Desktop\Document.exeProcess created: C:\Users\user\Desktop\Document.exe C:\Users\user\Desktop\Document.exe
                  Source: C:\Users\user\Desktop\Document.exeProcess created: C:\Users\user\Desktop\Document.exe C:\Users\user\Desktop\Document.exe
                  Source: C:\Users\user\Desktop\Document.exeProcess created: C:\Users\user\Desktop\Document.exe C:\Users\user\Desktop\Document.exe
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess created: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess created: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess created: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                  Source: C:\Users\user\Desktop\Document.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                  Source: C:\Users\user\Desktop\Document.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\Document.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Document.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Document.exe.logJump to behavior
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@17/4@3/3
                  Source: Document.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\Document.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\Desktop\Document.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: Document.exe, ProcExpGUI/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.0.Document.exe.20000.0.unpack, ProcExpGUI/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: InxbcD.exe.8.dr, ProcExpGUI/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 8.0.Document.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 8.0.Document.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: C:\Users\user\Desktop\Document.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\Document.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeFile read: C:\Windows\System32\drivers\etc\hosts
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeFile read: C:\Windows\System32\drivers\etc\hosts
                  Source: C:\Users\user\Desktop\Document.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                  Source: C:\Users\user\Desktop\Document.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: Document.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Document.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: Document.exe, ProcExpGUI/Form1.cs.Net Code: WaitHandle System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 0.0.Document.exe.20000.0.unpack, ProcExpGUI/Form1.cs.Net Code: WaitHandle System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: InxbcD.exe.8.dr, ProcExpGUI/Form1.cs.Net Code: WaitHandle System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: C:\Users\user\Desktop\Document.exeCode function: 0_2_06A6DF12 push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_01AA50F0 push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_01AA5540 push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DAE5E push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DAE46 push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DAEBE push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DAE8E push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DAED6 push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DAECE push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DAEC6 push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DAFB6 push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DAFAE push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DAFA6 push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DAFC2 push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DAD62 push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DADB6 push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DADAE push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DADFA push es; ret
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_063DAB19 push es; ret
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.787205536847968
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.787205536847968
                  Source: C:\Users\user\Desktop\Document.exeFile created: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Document.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run InxbcDJump to behavior
                  Source: C:\Users\user\Desktop\Document.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run InxbcDJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Users\user\Desktop\Document.exeFile opened: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe:Zone.Identifier read attributes | delete
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Document.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: 00000000.00000002.284409305.0000000002533000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.286387486.000000000277A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.356439070.0000000002E2A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.350967308.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Document.exe PID: 5756, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InxbcD.exe PID: 2136, type: MEMORYSTR
                  Source: Document.exe, 00000000.00000002.284409305.0000000002533000.00000004.00000800.00020000.00000000.sdmp, Document.exe, 00000000.00000002.286387486.000000000277A000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000012.00000002.356439070.0000000002E2A000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000012.00000002.350967308.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000015.00000002.376653194.0000000002BD3000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000015.00000002.377424463.0000000002E1E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: Document.exe, 00000000.00000002.284409305.0000000002533000.00000004.00000800.00020000.00000000.sdmp, Document.exe, 00000000.00000002.286387486.000000000277A000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000012.00000002.356439070.0000000002E2A000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000012.00000002.350967308.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000015.00000002.376653194.0000000002BD3000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000015.00000002.377424463.0000000002E1E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                  Source: C:\Users\user\Desktop\Document.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\Document.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\Document.exe TID: 5780Thread sleep time: -45877s >= -30000s
                  Source: C:\Users\user\Desktop\Document.exe TID: 5736Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\Desktop\Document.exe TID: 3768Thread sleep time: -1844674407370954s >= -30000s
                  Source: C:\Users\user\Desktop\Document.exe TID: 4208Thread sleep count: 9658 > 30
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe TID: 5988Thread sleep time: -45877s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe TID: 6024Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe TID: 5508Thread sleep time: -45877s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe TID: 5660Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe TID: 3652Thread sleep time: -1844674407370954s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe TID: 908Thread sleep count: 9478 > 30
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe TID: 5580Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe TID: 3672Thread sleep count: 9395 > 30
                  Source: C:\Users\user\Desktop\Document.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\Document.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\Document.exeWindow / User API: threadDelayed 9658
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeWindow / User API: threadDelayed 9478
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeWindow / User API: threadDelayed 9395
                  Source: C:\Users\user\Desktop\Document.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\Document.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Document.exeProcess information queried: ProcessInformation
                  Source: C:\Users\user\Desktop\Document.exeThread delayed: delay time: 45877
                  Source: C:\Users\user\Desktop\Document.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\Document.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeThread delayed: delay time: 45877
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeThread delayed: delay time: 45877
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeThread delayed: delay time: 922337203685477
                  Source: InxbcD.exe, 00000015.00000002.377424463.0000000002E1E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: InxbcD.exe, 00000015.00000002.377424463.0000000002E1E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: InxbcD.exe, 00000015.00000002.377424463.0000000002E1E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: InxbcD.exe, 00000018.00000002.522158378.0000000000E12000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.523803830.0000000000DD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: InxbcD.exe, 00000015.00000002.377424463.0000000002E1E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                  Source: C:\Users\user\Desktop\Document.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\Document.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\Document.exeCode function: 8_2_06C9F6D8 LdrInitializeThunk,
                  Source: C:\Users\user\Desktop\Document.exeMemory allocated: page read and write | page guard

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Document.exeMemory written: C:\Users\user\Desktop\Document.exe base: 400000 value starts with: 4D5A
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeMemory written: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe base: 400000 value starts with: 4D5A
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeMemory written: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe base: 400000 value starts with: 4D5A
                  Source: C:\Users\user\Desktop\Document.exeProcess created: C:\Users\user\Desktop\Document.exe C:\Users\user\Desktop\Document.exe
                  Source: C:\Users\user\Desktop\Document.exeProcess created: C:\Users\user\Desktop\Document.exe C:\Users\user\Desktop\Document.exe
                  Source: C:\Users\user\Desktop\Document.exeProcess created: C:\Users\user\Desktop\Document.exe C:\Users\user\Desktop\Document.exe
                  Source: C:\Users\user\Desktop\Document.exeProcess created: C:\Users\user\Desktop\Document.exe C:\Users\user\Desktop\Document.exe
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess created: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess created: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeProcess created: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Users\user\Desktop\Document.exe VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Users\user\Desktop\Document.exe VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\Document.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.Document.exe.3655e58.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Document.exe.3621838.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.0.Document.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Document.exe.3655e58.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Document.exe.3621838.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Document.exe.35eb418.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.287031983.00000000035EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000000.279787688.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.527070208.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000002.524941648.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Document.exe PID: 5756, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Document.exe PID: 6128, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InxbcD.exe PID: 3396, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InxbcD.exe PID: 1656, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\Document.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\Desktop\Document.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\Desktop\Document.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: C:\Users\user\Desktop\Document.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                  Source: C:\Users\user\Desktop\Document.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Source: Yara matchFile source: 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.527070208.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000002.524941648.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Document.exe PID: 6128, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InxbcD.exe PID: 3396, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InxbcD.exe PID: 1656, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.Document.exe.3655e58.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Document.exe.3621838.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.0.Document.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Document.exe.3655e58.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Document.exe.3621838.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Document.exe.35eb418.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.287031983.00000000035EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000000.279787688.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.527070208.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000002.524941648.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Document.exe PID: 5756, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Document.exe PID: 6128, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InxbcD.exe PID: 3396, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InxbcD.exe PID: 1656, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts211
                  Windows Management Instrumentation
                  1
                  Registry Run Keys / Startup Folder
                  111
                  Process Injection
                  1
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  114
                  System Information Discovery
                  Remote Services11
                  Archive Collected Data
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  Registry Run Keys / Startup Folder
                  1
                  Deobfuscate/Decode Files or Information
                  1
                  Input Capture
                  1
                  Query Registry
                  Remote Desktop Protocol2
                  Data from Local System
                  Exfiltration Over Bluetooth1
                  Non-Standard Port
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  311
                  Security Software Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  Automated Exfiltration1
                  Non-Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)13
                  Software Packing
                  NTDS1
                  Process Discovery
                  Distributed Component Object Model1
                  Input Capture
                  Scheduled Transfer11
                  Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Masquerading
                  LSA Secrets131
                  Virtualization/Sandbox Evasion
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common131
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials1
                  Application Window Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items111
                  Process Injection
                  DCSync1
                  Remote System Discovery
                  Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                  Hidden Files and Directories
                  Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 680351 Sample: Document.exe Startdate: 08/08/2022 Architecture: WINDOWS Score: 100 53 Malicious sample detected (through community Yara rule) 2->53 55 Multi AV Scanner detection for submitted file 2->55 57 Yara detected AgentTesla 2->57 59 6 other signatures 2->59 6 Document.exe 3 2->6         started        10 InxbcD.exe 3 2->10         started        12 InxbcD.exe 2 2->12         started        process3 file4 31 C:\Users\user\AppData\...\Document.exe.log, ASCII 6->31 dropped 61 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->61 63 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 6->63 65 Injects a PE file into a foreign processes 6->65 14 Document.exe 2 5 6->14         started        19 Document.exe 6->19         started        21 Document.exe 6->21         started        23 Document.exe 6->23         started        67 Multi AV Scanner detection for dropped file 10->67 69 Machine Learning detection for dropped file 10->69 25 InxbcD.exe 2 10->25         started        27 InxbcD.exe 10->27         started        29 InxbcD.exe 12->29         started        signatures5 process6 dnsIp7 37 us2.smtp.mailhostbox.com 208.91.199.225, 49744, 49777, 587 PUBLIC-DOMAIN-REGISTRYUS United States 14->37 39 192.168.2.1 unknown unknown 14->39 33 C:\Users\user\AppData\Roaming\...\InxbcD.exe, PE32 14->33 dropped 35 C:\Users\user\...\InxbcD.exe:Zone.Identifier, ASCII 14->35 dropped 43 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->43 45 Tries to steal Mail credentials (via file / registry access) 14->45 47 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->47 41 208.91.198.143, 49780, 587 PUBLIC-DOMAIN-REGISTRYUS United States 29->41 49 Tries to harvest and steal ftp login credentials 29->49 51 Tries to harvest and steal browser information (history, passwords, etc) 29->51 file8 signatures9

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Document.exe28%VirustotalBrowse
                  Document.exe17%ReversingLabs
                  Document.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe28%VirustotalBrowse
                  C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe17%ReversingLabs
                  SourceDetectionScannerLabelLinkDownload
                  8.0.Document.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                  http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                  https://sectigo.com/CPS00%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  https://api.ipify.org%appdata0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                  http://JaRAdc.com0%Avira URL Cloudsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://ocsp.sectigo.com0A0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  https://api.ipify.org%0%URL Reputationsafe
                  http://0PYcqQo9t3HlEFYDO.org0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  us2.smtp.mailhostbox.com
                  208.91.199.225
                  truefalse
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#Document.exe, 00000008.00000002.568031255.0000000006872000.00000004.00000800.00020000.00000000.sdmp, Document.exe, 00000008.00000002.551388083.000000000363F000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.520740305.0000000000DD6000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.550192268.0000000002F20000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.522158378.0000000000E12000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.523803830.0000000000DD4000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.572962420.0000000006680000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.553154806.0000000002D11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://127.0.0.1:HTTP/1.1Document.exe, 00000008.00000002.527070208.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.524941648.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.apache.org/licenses/LICENSE-2.0Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designersGDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://sectigo.com/CPS0Document.exe, 00000008.00000002.568031255.0000000006872000.00000004.00000800.00020000.00000000.sdmp, Document.exe, 00000008.00000002.551388083.000000000363F000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.520740305.0000000000DD6000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.550192268.0000000002F20000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.522158378.0000000000E12000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.523803830.0000000000DD4000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.572962420.0000000006680000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.553154806.0000000002D11000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/?Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/bTheDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://us2.smtp.mailhostbox.comDocument.exe, 00000008.00000002.551388083.000000000363F000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.550192268.0000000002F20000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.553154806.0000000002D11000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://api.ipify.org%appdataInxbcD.exe, 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              low
                              http://www.fontbureau.com/designers?Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwDocument.exe, 00000008.00000002.527070208.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.524941648.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.tiro.comDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designersDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.goodfont.co.krDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comlDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sajatypeworks.comDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.typography.netDDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/cabarga.htmlNDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cn/cTheDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/staff/dennis.htmDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://fontfabrik.comDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cnDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/frere-jones.htmlDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.jiyu-kobo.co.jp/Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://DynDns.comDynDNSnamejidpasswordPsi/PsiInxbcD.exe, 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://JaRAdc.comInxbcD.exe, 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.galapagosdesign.com/DPleaseDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers8Document.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://ocsp.sectigo.com0ADocument.exe, 00000008.00000002.568031255.0000000006872000.00000004.00000800.00020000.00000000.sdmp, Document.exe, 00000008.00000002.551388083.000000000363F000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.520740305.0000000000DD6000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.550192268.0000000002F20000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.522158378.0000000000E12000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.523803830.0000000000DD4000.00000004.00000020.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.572962420.0000000006680000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.553154806.0000000002D11000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fonts.comDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.sandoll.co.krDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.urwpp.deDPleaseDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.zhongyicts.com.cnDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.sakkal.comDocument.exe, 00000000.00000002.290637100.0000000006562000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.ipify.org%Document.exe, 00000008.00000002.527070208.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000018.00000002.524941648.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, InxbcD.exe, 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          low
                                          http://0PYcqQo9t3HlEFYDO.orgInxbcD.exe, 00000019.00000002.552920598.0000000002D0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          208.91.198.143
                                          unknownUnited States
                                          394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                          208.91.199.225
                                          us2.smtp.mailhostbox.comUnited States
                                          394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                          IP
                                          192.168.2.1
                                          Joe Sandbox Version:35.0.0 Citrine
                                          Analysis ID:680351
                                          Start date and time: 08/08/202212:54:102022-08-08 12:54:10 +02:00
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 9m 21s
                                          Hypervisor based Inspection enabled:false
                                          Report type:light
                                          Sample file name:Document.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:35
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.evad.winEXE@17/4@3/3
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HDC Information:Failed
                                          HCA Information:
                                          • Successful, ratio: 98%
                                          • Number of executed functions: 0
                                          • Number of non-executed functions: 0
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Adjust boot time
                                          • Enable AMSI
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                          • TCP Packets have been reduced to 100
                                          • Excluded IPs from analysis (whitelisted): 23.211.6.115, 23.213.164.66
                                          • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          TimeTypeDescription
                                          12:55:23API Interceptor674x Sleep call for process: Document.exe modified
                                          12:55:34AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run InxbcD C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                                          12:55:43AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run InxbcD C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                                          12:55:51API Interceptor698x Sleep call for process: InxbcD.exe modified
                                          No context
                                          No context
                                          No context
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\Document.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1308
                                          Entropy (8bit):5.345811588615766
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                          MD5:2E016B886BDB8389D2DD0867BE55F87B
                                          SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                          SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                          SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                          Malicious:true
                                          Reputation:high, very likely benign file
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                          Process:C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1308
                                          Entropy (8bit):5.345811588615766
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                          MD5:2E016B886BDB8389D2DD0867BE55F87B
                                          SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                          SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                          SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                          Malicious:false
                                          Reputation:high, very likely benign file
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                          Process:C:\Users\user\Desktop\Document.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):823808
                                          Entropy (8bit):7.781001148520893
                                          Encrypted:false
                                          SSDEEP:24576:FFxgV10lgTyhAvtvFhdTOZPe9IbUDHDl:pgVWUyhAvtvFhdTY7U
                                          MD5:7ED91A8A05D340670440C48390AABA1C
                                          SHA1:370E2C4ED3A4FF0F6FC6BC6D634AD29D7690AE0A
                                          SHA-256:7E525FAF627CCA0905153E9AB2D1308006466097A041395573E2FF31C58B69A7
                                          SHA-512:569077E17AC42E6BE529A7A22E45A8D947A1C5DFC62BAF172C59E81C40DCA99264DFC0CB7B257068A26C560EAE24C04A4F3E60357025413843820418F80280EE
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: Virustotal, Detection: 28%, Browse
                                          • Antivirus: ReversingLabs, Detection: 17%
                                          Reputation:low
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."..b..............0................. ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........S..(U...........................................................0..k..............%.r...p.%.r[..p.%.ri..p.}......}.....(.......(......{.....o......{.....o.....~....t.....{....(....&*&..(.....*..*.0.................{....o.....o.....sL.....o.....o....o....(.........oD.....o........9......{....o ...o!.....{....o"....o#...r...p.o$...oU...o%....M...(&...o'.......8......o$...oU.....o(...o)...s*.....o.....o$...oU.....o(...o+...o,...o-...&.o.....o$...oU.....o(...o+...o....o-
                                          Process:C:\Users\user\Desktop\Document.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:modified
                                          Size (bytes):26
                                          Entropy (8bit):3.95006375643621
                                          Encrypted:false
                                          SSDEEP:3:ggPYV:rPYV
                                          MD5:187F488E27DB4AF347237FE461A079AD
                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                          Malicious:true
                                          Reputation:high, very likely benign file
                                          Preview:[ZoneTransfer]....ZoneId=0
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.781001148520893
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          • DOS Executable Generic (2002/1) 0.01%
                                          File name:Document.exe
                                          File size:823808
                                          MD5:7ed91a8a05d340670440c48390aaba1c
                                          SHA1:370e2c4ed3a4ff0f6fc6bc6d634ad29d7690ae0a
                                          SHA256:7e525faf627cca0905153e9ab2d1308006466097a041395573e2ff31c58b69a7
                                          SHA512:569077e17ac42e6be529a7a22e45a8d947a1c5dfc62baf172c59e81c40dca99264dfc0cb7b257068a26c560eae24c04a4f3e60357025413843820418f80280ee
                                          SSDEEP:24576:FFxgV10lgTyhAvtvFhdTOZPe9IbUDHDl:pgVWUyhAvtvFhdTY7U
                                          TLSH:BE05BE5BBF147708C5A36AB4EE0BB96267F61C5D3135E0B83E547C4A4AFF301E52242A
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."..b..............0.................. ........@.. ....................................@................................
                                          Icon Hash:00828e8e8686b000
                                          Entrypoint:0x4ca9f2
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x62F0BB22 [Mon Aug 8 07:28:34 2022 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xca9a00x4f.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xcc0000x3d0.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xce0000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000xc89f80xc8a00False0.8177667445482866data7.787205536847968IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0xcc0000x3d00x400False0.3837890625data3.0440429899176986IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xce0000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountry
                                          RT_VERSION0xcc0580x374data
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampSource PortDest PortSource IPDest IP
                                          Aug 8, 2022 12:55:46.548738956 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:46.716939926 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:46.717205048 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:50.893640995 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:50.893995047 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:51.061827898 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:51.062006950 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:51.062292099 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:51.230369091 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:51.275805950 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:51.444633007 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:51.444693089 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:51.444734097 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:51.444762945 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:51.444789886 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:51.444809914 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:51.448621988 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:51.543545008 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:51.614767075 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:51.657484055 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:51.826605082 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:52.043581963 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:52.085932970 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:52.254144907 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:52.255610943 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:52.426814079 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:52.430459023 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:52.603749990 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:52.604528904 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:52.773387909 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:52.773827076 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:52.965123892 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:52.976968050 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:53.145898104 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:53.147037029 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:53.147173882 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:53.147833109 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:53.147933006 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:55:53.314980030 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:53.317739964 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:53.440301895 CEST58749744208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:55:53.637490988 CEST49744587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:34.683269024 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:34.849540949 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:34.851684093 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:35.456537008 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:35.547338009 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:35.593027115 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:35.759546995 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:35.759733915 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:35.844222069 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:35.846904993 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:36.013546944 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:36.234888077 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:36.406636953 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:36.572982073 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:36.573018074 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:36.573040962 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:36.573056936 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:36.573084116 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:36.573133945 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:36.575385094 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:36.735094070 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:36.741107941 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:36.844441891 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:37.074443102 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:37.241643906 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:37.344326973 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:39.497345924 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:39.664825916 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:39.665436983 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:39.835731030 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:39.836378098 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:40.006812096 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:40.007275105 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:40.175622940 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:40.178391933 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:40.369616032 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:40.370012045 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:40.537209034 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:40.538456917 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:40.538657904 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:40.538769960 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:40.538887978 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:40.704484940 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:40.706026077 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:40.835095882 CEST58749777208.91.199.225192.168.2.3
                                          Aug 8, 2022 12:56:41.047856092 CEST49777587192.168.2.3208.91.199.225
                                          Aug 8, 2022 12:56:49.444216013 CEST49780587192.168.2.3208.91.198.143
                                          Aug 8, 2022 12:56:49.610522032 CEST58749780208.91.198.143192.168.2.3
                                          Aug 8, 2022 12:56:49.612788916 CEST49780587192.168.2.3208.91.198.143
                                          Aug 8, 2022 12:56:50.155709028 CEST58749780208.91.198.143192.168.2.3
                                          Aug 8, 2022 12:56:50.156405926 CEST49780587192.168.2.3208.91.198.143
                                          Aug 8, 2022 12:56:50.322803974 CEST58749780208.91.198.143192.168.2.3
                                          Aug 8, 2022 12:56:50.322856903 CEST58749780208.91.198.143192.168.2.3
                                          Aug 8, 2022 12:56:50.323129892 CEST49780587192.168.2.3208.91.198.143
                                          Aug 8, 2022 12:56:50.490689039 CEST58749780208.91.198.143192.168.2.3
                                          Aug 8, 2022 12:56:50.548585892 CEST49780587192.168.2.3208.91.198.143
                                          Aug 8, 2022 12:56:50.574191093 CEST49780587192.168.2.3208.91.198.143
                                          Aug 8, 2022 12:56:50.740653038 CEST58749780208.91.198.143192.168.2.3
                                          TimestampSource PortDest PortSource IPDest IP
                                          Aug 8, 2022 12:55:46.484108925 CEST5772353192.168.2.38.8.8.8
                                          Aug 8, 2022 12:55:46.509882927 CEST53577238.8.8.8192.168.2.3
                                          Aug 8, 2022 12:56:34.583363056 CEST5862553192.168.2.38.8.8.8
                                          Aug 8, 2022 12:56:34.602864981 CEST53586258.8.8.8192.168.2.3
                                          Aug 8, 2022 12:56:49.363284111 CEST5077853192.168.2.38.8.8.8
                                          Aug 8, 2022 12:56:49.385094881 CEST53507788.8.8.8192.168.2.3
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                          Aug 8, 2022 12:55:46.484108925 CEST192.168.2.38.8.8.80xafa7Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)
                                          Aug 8, 2022 12:56:34.583363056 CEST192.168.2.38.8.8.80xe8beStandard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)
                                          Aug 8, 2022 12:56:49.363284111 CEST192.168.2.38.8.8.80xa9b6Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                          Aug 8, 2022 12:55:46.509882927 CEST8.8.8.8192.168.2.30xafa7No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)
                                          Aug 8, 2022 12:55:46.509882927 CEST8.8.8.8192.168.2.30xafa7No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)
                                          Aug 8, 2022 12:55:46.509882927 CEST8.8.8.8192.168.2.30xafa7No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)
                                          Aug 8, 2022 12:55:46.509882927 CEST8.8.8.8192.168.2.30xafa7No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)
                                          Aug 8, 2022 12:56:34.602864981 CEST8.8.8.8192.168.2.30xe8beNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)
                                          Aug 8, 2022 12:56:34.602864981 CEST8.8.8.8192.168.2.30xe8beNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)
                                          Aug 8, 2022 12:56:34.602864981 CEST8.8.8.8192.168.2.30xe8beNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)
                                          Aug 8, 2022 12:56:34.602864981 CEST8.8.8.8192.168.2.30xe8beNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)
                                          Aug 8, 2022 12:56:49.385094881 CEST8.8.8.8192.168.2.30xa9b6No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)
                                          Aug 8, 2022 12:56:49.385094881 CEST8.8.8.8192.168.2.30xa9b6No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)
                                          Aug 8, 2022 12:56:49.385094881 CEST8.8.8.8192.168.2.30xa9b6No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)
                                          Aug 8, 2022 12:56:49.385094881 CEST8.8.8.8192.168.2.30xa9b6No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)
                                          TimestampSource PortDest PortSource IPDest IPCommands
                                          Aug 8, 2022 12:55:50.893640995 CEST58749744208.91.199.225192.168.2.3220 us2.outbound.mailhostbox.com ESMTP Postfix
                                          Aug 8, 2022 12:55:50.893995047 CEST49744587192.168.2.3208.91.199.225EHLO 035347
                                          Aug 8, 2022 12:55:51.062006950 CEST58749744208.91.199.225192.168.2.3250-us2.outbound.mailhostbox.com
                                          250-PIPELINING
                                          250-SIZE 41648128
                                          250-VRFY
                                          250-ETRN
                                          250-STARTTLS
                                          250-AUTH PLAIN LOGIN
                                          250-AUTH=PLAIN LOGIN
                                          250-ENHANCEDSTATUSCODES
                                          250-8BITMIME
                                          250-DSN
                                          250 CHUNKING
                                          Aug 8, 2022 12:55:51.062292099 CEST49744587192.168.2.3208.91.199.225STARTTLS
                                          Aug 8, 2022 12:55:51.230369091 CEST58749744208.91.199.225192.168.2.3220 2.0.0 Ready to start TLS
                                          Aug 8, 2022 12:56:35.456537008 CEST58749777208.91.199.225192.168.2.3220 us2.outbound.mailhostbox.com ESMTP Postfix
                                          Aug 8, 2022 12:56:35.593027115 CEST49777587192.168.2.3208.91.199.225EHLO 035347
                                          Aug 8, 2022 12:56:35.759733915 CEST58749777208.91.199.225192.168.2.3250-us2.outbound.mailhostbox.com
                                          250-PIPELINING
                                          250-SIZE 41648128
                                          250-VRFY
                                          250-ETRN
                                          250-STARTTLS
                                          250-AUTH PLAIN LOGIN
                                          250-AUTH=PLAIN LOGIN
                                          250-ENHANCEDSTATUSCODES
                                          250-8BITMIME
                                          250-DSN
                                          250 CHUNKING
                                          Aug 8, 2022 12:56:35.846904993 CEST49777587192.168.2.3208.91.199.225STARTTLS
                                          Aug 8, 2022 12:56:36.013546944 CEST58749777208.91.199.225192.168.2.3220 2.0.0 Ready to start TLS
                                          Aug 8, 2022 12:56:50.155709028 CEST58749780208.91.198.143192.168.2.3220 us2.outbound.mailhostbox.com ESMTP Postfix
                                          Aug 8, 2022 12:56:50.156405926 CEST49780587192.168.2.3208.91.198.143EHLO 035347
                                          Aug 8, 2022 12:56:50.322856903 CEST58749780208.91.198.143192.168.2.3250-us2.outbound.mailhostbox.com
                                          250-PIPELINING
                                          250-SIZE 41648128
                                          250-VRFY
                                          250-ETRN
                                          250-STARTTLS
                                          250-AUTH PLAIN LOGIN
                                          250-AUTH=PLAIN LOGIN
                                          250-ENHANCEDSTATUSCODES
                                          250-8BITMIME
                                          250-DSN
                                          250 CHUNKING
                                          Aug 8, 2022 12:56:50.323129892 CEST49780587192.168.2.3208.91.198.143STARTTLS
                                          Aug 8, 2022 12:56:50.490689039 CEST58749780208.91.198.143192.168.2.3220 2.0.0 Ready to start TLS

                                          Click to jump to process

                                          Target ID:0
                                          Start time:12:55:11
                                          Start date:08/08/2022
                                          Path:C:\Users\user\Desktop\Document.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\Document.exe"
                                          Imagebase:0x20000
                                          File size:823808 bytes
                                          MD5 hash:7ED91A8A05D340670440C48390AABA1C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.284409305.0000000002533000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.286387486.000000000277A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.287031983.00000000035EB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.287031983.00000000035EB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.287031983.00000000035EB000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          Reputation:low

                                          Target ID:4
                                          Start time:12:55:25
                                          Start date:08/08/2022
                                          Path:C:\Users\user\Desktop\Document.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Users\user\Desktop\Document.exe
                                          Imagebase:0xc0000
                                          File size:823808 bytes
                                          MD5 hash:7ED91A8A05D340670440C48390AABA1C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low

                                          Target ID:5
                                          Start time:12:55:25
                                          Start date:08/08/2022
                                          Path:C:\Users\user\Desktop\Document.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Users\user\Desktop\Document.exe
                                          Imagebase:0x50000
                                          File size:823808 bytes
                                          MD5 hash:7ED91A8A05D340670440C48390AABA1C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low

                                          Target ID:6
                                          Start time:12:55:26
                                          Start date:08/08/2022
                                          Path:C:\Users\user\Desktop\Document.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Users\user\Desktop\Document.exe
                                          Imagebase:0x3a0000
                                          File size:823808 bytes
                                          MD5 hash:7ED91A8A05D340670440C48390AABA1C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low

                                          Target ID:8
                                          Start time:12:55:27
                                          Start date:08/08/2022
                                          Path:C:\Users\user\Desktop\Document.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\Document.exe
                                          Imagebase:0xeb0000
                                          File size:823808 bytes
                                          MD5 hash:7ED91A8A05D340670440C48390AABA1C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.279787688.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.279787688.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000008.00000000.279787688.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.527070208.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.527070208.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:18
                                          Start time:12:55:43
                                          Start date:08/08/2022
                                          Path:C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe"
                                          Imagebase:0x760000
                                          File size:823808 bytes
                                          MD5 hash:7ED91A8A05D340670440C48390AABA1C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000012.00000002.356439070.0000000002E2A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000012.00000002.350967308.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Antivirus matches:
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 28%, Virustotal, Browse
                                          • Detection: 17%, ReversingLabs
                                          Reputation:low

                                          Target ID:21
                                          Start time:12:55:52
                                          Start date:08/08/2022
                                          Path:C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe"
                                          Imagebase:0x6e0000
                                          File size:823808 bytes
                                          MD5 hash:7ED91A8A05D340670440C48390AABA1C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:.Net C# or VB.NET
                                          Reputation:low

                                          Target ID:22
                                          Start time:12:55:54
                                          Start date:08/08/2022
                                          Path:C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                                          Imagebase:0x250000
                                          File size:823808 bytes
                                          MD5 hash:7ED91A8A05D340670440C48390AABA1C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:low

                                          Target ID:24
                                          Start time:12:55:55
                                          Start date:08/08/2022
                                          Path:C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                                          Imagebase:0x7ff73c930000
                                          File size:823808 bytes
                                          MD5 hash:7ED91A8A05D340670440C48390AABA1C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000018.00000002.524941648.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000018.00000002.524941648.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:25
                                          Start time:12:56:09
                                          Start date:08/08/2022
                                          Path:C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Roaming\InxbcD\InxbcD.exe
                                          Imagebase:0x520000
                                          File size:823808 bytes
                                          MD5 hash:7ED91A8A05D340670440C48390AABA1C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000019.00000002.529474477.00000000029BC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          No disassembly