Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:756297
MD5:cfc1c66cba07daef1e8ac13d5e042e7a
SHA1:10451947894a7af9a06adc619179e00e933fb20a
SHA256:addc1564d69b115e0cb5ff2264614c98dc51107f042e3ea0d93b99e49cf2e94b
Tags:NETexeMSILSnakeKeylogger
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AntiVM3
Antivirus / Scanner detection for submitted sample
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • file.exe (PID: 1128 cmdline: C:\Users\user\Desktop\file.exe MD5: CFC1C66CBA07DAEF1E8AC13D5E042E7A)
    • file.exe (PID: 5916 cmdline: C:\Users\user\Desktop\file.exe MD5: CFC1C66CBA07DAEF1E8AC13D5E042E7A)
    • file.exe (PID: 4844 cmdline: C:\Users\user\Desktop\file.exe MD5: CFC1C66CBA07DAEF1E8AC13D5E042E7A)
    • file.exe (PID: 5260 cmdline: C:\Users\user\Desktop\file.exe MD5: CFC1C66CBA07DAEF1E8AC13D5E042E7A)
    • audiodg.exe (PID: 4844 cmdline: C:\Windows\system32\AUDIODG.EXE 0x364 MD5: 0B245353F92DF527AA7613BA2C0DA023)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "arinzelog@saonline.xyz", "Password": "7213575aceACE@#$", "Host": "cp5ua.hyperhost.ua", "Port": "587"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.365680487.0000000003439000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
          • 0x522dc:$x1: $%SMTPDV$
          • 0x522f2:$x2: $#TheHashHere%&
          • 0x537f3:$x3: %FTPDV$
          • 0x538b7:$x4: $%TelegramDv$
          • 0x4fb75:$x5: KeyLoggerEventArgs
          • 0x4ff0b:$x5: KeyLoggerEventArgs
          • 0x53817:$m2: Clipboard Logs ID
          • 0x53a1d:$m2: Screenshot Logs ID
          • 0x53b2d:$m2: keystroke Logs ID
          • 0x53d11:$m3: SnakePW
          • 0x539f5:$m4: \SnakeKeylogger\
          Click to see the 22 entries
          SourceRuleDescriptionAuthorStrings
          0.2.file.exe.416fa10.6.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
          • 0x198d3:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x18b05:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x18f38:$a4: \Orbitum\User Data\Default\Login Data
          • 0x1a05f:$a5: \Kometa\User Data\Default\Login Data
          0.2.file.exe.416fa10.6.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.file.exe.416fa10.6.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              0.2.file.exe.416fa10.6.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.file.exe.416fa10.6.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
                • 0x12d07:$s1: UnHook
                • 0x12d0e:$s2: SetHook
                • 0x12d16:$s3: CallNextHook
                • 0x12d23:$s4: _hook
                Click to see the 33 entries
                No Sigma rule has matched
                Timestamp:192.168.2.4193.122.130.049696802039190 11/30/22-00:11:36.516564
                SID:2039190
                Source Port:49696
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: file.exeReversingLabs: Detection: 37%
                Source: file.exeVirustotal: Detection: 25%Perma Link
                Source: file.exeAvira: detected
                Source: file.exeJoe Sandbox ML: detected
                Source: 3.0.file.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
                Source: 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "arinzelog@saonline.xyz", "Password": "7213575aceACE@#$", "Host": "cp5ua.hyperhost.ua", "Port": "587"}
                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0164F851h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 01648597h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 016489F7h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0164FCA9h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 01647CD7h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 01648E57h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 01646D19h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 016468A2h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 01648137h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 016472E0h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 016472E0h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 016472E0h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06727CF1h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 067248D1h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0672DCA9h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 067285A1h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06725181h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0672E581h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06728149h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06724D29h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0672E129h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 067289F9h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 067255D9h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0672E9D9h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06725E89h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0672F289h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06725A31h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0672EE31h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06723319h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 067262E1h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0672F6E1h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06726B91h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06723771h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0672FB62h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06726739h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06724021h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06726FE9h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06723BC9h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06727899h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06724479h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06727441h
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
                Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]

                Networking

                barindex
                Source: TrafficSnort IDS: 2039190 ET TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.4:49696 -> 193.122.130.0:80
                Source: C:\Users\user\Desktop\file.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\file.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\file.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\file.exeDNS query: name: checkip.dyndns.org
                Source: Yara matchFile source: 0.2.file.exe.44a67c8.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.416fa10.6.raw.unpack, type: UNPACKEDPE
                Source: Joe Sandbox ViewASN Name: ORACLE-BMC-31898US ORACLE-BMC-31898US
                Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: file.exe, 00000003.00000002.588227793.0000000003222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: file.exe, 00000003.00000002.588190939.0000000003216000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000002.588227793.0000000003222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: file.exe, 00000003.00000002.587378130.0000000003181000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: file.exe, 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: file.exe, 00000003.00000002.588190939.0000000003216000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4
                Source: file.exe, 00000000.00000003.321085020.0000000005DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.w
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: file.exe, 00000003.00000002.587378130.0000000003181000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322654693.0000000005DE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: file.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                Source: file.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTC
                Source: file.exe, 00000000.00000003.323222872.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323273225.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323456584.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323165080.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.come
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: file.exe, 00000000.00000003.323222872.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323273225.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323456584.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322849771.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323165080.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.
                Source: file.exe, 00000000.00000003.323222872.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323273225.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323456584.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323165080.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comt
                Source: file.exe, 00000000.00000003.323273225.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comuctP
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.357757128.0000000005DD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: file.exe, 00000000.00000003.328186440.0000000005DED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: file.exe, 00000000.00000003.326503329.0000000005DEA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.327161655.0000000005DEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers&
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: file.exe, 00000000.00000003.327948700.0000000005DED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
                Source: file.exe, 00000000.00000003.328017976.0000000005DED000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.327948700.0000000005DED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html8
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                Source: file.exe, 00000000.00000003.327061644.0000000005DEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.htmlh
                Source: file.exe, 00000000.00000003.325835624.0000000005DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/h
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: file.exe, 00000000.00000003.328259813.0000000005DED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersR
                Source: file.exe, 00000000.00000003.357757128.0000000005DD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comoitu
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: file.exe, 00000000.00000003.322004645.0000000005DDC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322040067.0000000005DFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: file.exe, 00000000.00000003.322190648.0000000005DFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: file.exe, 00000000.00000003.322190648.0000000005DFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn9)z
                Source: file.exe, 00000000.00000003.322004645.0000000005DDC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322247274.0000000005DDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn_
                Source: file.exe, 00000000.00000003.322004645.0000000005DDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnn-uAofz
                Source: file.exe, 00000000.00000003.331690866.0000000005DE7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331745202.0000000005DE8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331466240.0000000005DE5000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331580926.0000000005DE7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331524670.0000000005DE5000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331820779.0000000005DE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: file.exe, 00000000.00000003.331573813.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.332017649.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331737193.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331448993.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331935801.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331515934.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.332325766.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331681925.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331804071.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.332125875.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.332245431.0000000005DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: file.exe, 00000000.00000003.338369032.0000000005DF7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.338650954.0000000005DF7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323570476.0000000005E1E000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323578756.0000000005E1F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322410540.0000000005E1E000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323642134.0000000005E1F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322390325.0000000005E1E000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323539855.0000000005E1E000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322437371.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: file.exe, 00000000.00000003.322314879.0000000005E1E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com#
                Source: file.exe, 00000000.00000003.322410540.0000000005E1E000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322390325.0000000005E1E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comn
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: file.exe, 00000000.00000003.325630110.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.325677616.0000000005DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
                Source: file.exe, 00000000.00000003.325755043.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.325630110.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.325677616.0000000005DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de2
                Source: file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: file.exe, 00000000.00000003.325630110.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.325677616.0000000005DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.dew
                Source: file.exe, 00000000.00000003.325630110.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.325677616.0000000005DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.dewa
                Source: file.exe, 00000000.00000003.323222872.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323273225.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323456584.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322784264.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322849771.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322819666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323165080.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: file.exe, 00000000.00000003.322784264.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322849771.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322819666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cne
                Source: file.exe, 00000000.00000003.323222872.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323273225.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323456584.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322784264.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322849771.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322819666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323165080.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnmd
                Source: file.exe, 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive

                System Summary

                barindex
                Source: 0.2.file.exe.416fa10.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.file.exe.416fa10.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.file.exe.416fa10.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.file.exe.416fa10.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.file.exe.44a67c8.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.file.exe.44a67c8.10.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.file.exe.44a67c8.10.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.file.exe.44a67c8.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.file.exe.44a67c8.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.file.exe.44a67c8.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.file.exe.44a67c8.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.file.exe.44a67c8.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 3.0.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 3.0.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 3.0.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 3.0.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.file.exe.416fa10.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.file.exe.416fa10.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.file.exe.416fa10.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.file.exe.416fa10.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: file.exe PID: 1128, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: file.exe PID: 1128, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: file.exe PID: 5260, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: file.exe PID: 5260, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.file.exe.416fa10.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.file.exe.416fa10.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.file.exe.416fa10.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.file.exe.416fa10.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.file.exe.44a67c8.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.file.exe.44a67c8.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.file.exe.44a67c8.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.file.exe.44a67c8.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.file.exe.44a67c8.10.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.file.exe.44a67c8.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.file.exe.44a67c8.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.file.exe.44a67c8.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 3.0.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 3.0.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 3.0.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 3.0.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.file.exe.416fa10.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.file.exe.416fa10.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.file.exe.416fa10.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.file.exe.416fa10.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: file.exe PID: 1128, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: file.exe PID: 1128, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: file.exe PID: 5260, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: file.exe PID: 5260, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F4F650
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F4C1F4
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F4E650
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F4E642
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0164B020
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_016430F2
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_01647358
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0164F321
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_016482D8
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_01648738
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0164F9F0
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_016479A8
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_01648B98
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_01646A59
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_01645DB7
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_01647E78
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_01647349
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_016452C7
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_016452D8
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0164EBA8
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0164EB98
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06727A48
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06724628
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672DA00
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_067282F8
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06724ED8
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672E2D8
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06727EA0
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06724A80
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672DE80
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672B370
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06728750
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06725330
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672E730
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06725BE0
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672EFE0
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06728BA8
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672BF98
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06725788
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672EB88
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06723070
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06720040
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06726038
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672F438
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_067268E8
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_067234C8
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672F8B8
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06726490
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672CC98
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06723D78
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06726D40
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06723920
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_067275F0
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_067241D0
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06727198
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06724A72
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672DE70
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06727A38
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06724619
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_067282F4
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672B2CB
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06724EC8
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672E2C8
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06727E91
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672577B
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672EB78
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06728740
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672E723
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06725320
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06725BD0
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672EFD1
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06728B98
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06723060
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672BC20
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672602A
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672F429
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672BC13
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06720007
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_067268DA
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_067234B8
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672F8A8
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06726481
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672CC88
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06723D69
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06726D30
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06723910
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672D9F0
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_067275E2
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_067241C3
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_06727188
                Source: file.exe, 00000000.00000002.360238493.0000000002F91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePrecision.dll6 vs file.exe
                Source: file.exe, 00000000.00000002.360238493.0000000002F91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameInspector.dllN vs file.exe
                Source: file.exe, 00000000.00000002.360238493.0000000002F91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs file.exe
                Source: file.exe, 00000000.00000000.316505384.0000000000B5A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamexjjr.exe6 vs file.exe
                Source: file.exe, 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs file.exe
                Source: file.exe, 00000000.00000002.375544869.0000000007740000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs file.exe
                Source: file.exe, 00000000.00000002.375282903.0000000007530000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameInspector.dllN vs file.exe
                Source: file.exe, 00000000.00000002.368144069.00000000041CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs file.exe
                Source: file.exe, 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs file.exe
                Source: file.exe, 00000003.00000002.585023334.0000000000FC7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs file.exe
                Source: file.exe, 00000003.00000000.356676715.0000000000422000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs file.exe
                Source: file.exeBinary or memory string: OriginalFilenamexjjr.exe6 vs file.exe
                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: file.exeReversingLabs: Detection: 37%
                Source: file.exeVirustotal: Detection: 25%
                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\audiodg.exe C:\Windows\system32\AUDIODG.EXE 0x364
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/1@2/2
                Source: file.exe, 00000003.00000002.588422652.0000000003274000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000002.588463806.0000000003280000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000002.588794821.00000000041FC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\file.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\file.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: 3.0.file.exe.400000.0.unpack, ?u060cufffd??/ufffd?ufffd??.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                Source: 3.0.file.exe.400000.0.unpack, ??u00be?u05c3/?????.csCryptographic APIs: 'TransformFinalBlock'
                Source: 3.0.file.exe.400000.0.unpack, ??u00be?u05c3/?????.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                Data Obfuscation

                barindex
                Source: file.exe, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.0.file.exe.aa0000.0.unpack, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0672A3CB push esp; ret
                Source: file.exeStatic PE information: 0xA1D69E9C [Sat Jan 15 21:24:44 2056 UTC]
                Source: initial sampleStatic PE information: section name: .text entropy: 7.516664543280966
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 00000000.00000002.365680487.0000000003439000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 1128, type: MEMORYSTR
                Source: file.exe, 00000000.00000002.365680487.0000000003439000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: file.exe, 00000000.00000002.365680487.0000000003439000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                Source: C:\Users\user\Desktop\file.exe TID: 2024Thread sleep time: -38122s >= -30000s
                Source: C:\Users\user\Desktop\file.exe TID: 5308Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 38122
                Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477
                Source: file.exe, 00000000.00000002.365680487.0000000003439000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: file.exe, 00000000.00000002.365680487.0000000003439000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: file.exe, 00000000.00000002.365680487.0000000003439000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: file.exe, 00000000.00000002.365680487.0000000003439000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                Source: C:\Users\user\Desktop\file.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\file.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\file.exeCode function: 3_2_01647358 LdrInitializeThunk,
                Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 3.0.file.exe.400000.0.unpack, ??u00be?u05c3/?????.csReference to suspicious API methods: ('???m?', 'MapVirtualKey@user32.dll')
                Source: 3.0.file.exe.400000.0.unpack, u05c9??m?/ufffd?u060c?u26ca.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Users\user\Desktop\file.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.file.exe.416fa10.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.44a67c8.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.44a67c8.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.416fa10.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 1128, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 5260, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.file.exe.416fa10.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.44a67c8.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.44a67c8.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.416fa10.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 1128, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 5260, type: MEMORYSTR
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: Yara matchFile source: 0.2.file.exe.416fa10.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.44a67c8.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.44a67c8.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.416fa10.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 1128, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 5260, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.file.exe.416fa10.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.44a67c8.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.44a67c8.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.416fa10.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 1128, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 5260, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.file.exe.416fa10.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.44a67c8.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.44a67c8.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.416fa10.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 1128, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 5260, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts1
                Native API
                Path Interception111
                Process Injection
                1
                Masquerading
                2
                OS Credential Dumping
                11
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                Exfiltration Over Bluetooth1
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
                Virtualization/Sandbox Evasion
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares2
                Data from Local System
                Automated Exfiltration2
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                Process Injection
                NTDS1
                Remote System Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer12
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common3
                Obfuscated Files or Information
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items13
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                Timestomp
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                file.exe38%ReversingLabsByteCode-MSIL.Trojan.Pwsx
                file.exe25%VirustotalBrowse
                file.exe100%AviraHEUR/AGEN.1249296
                file.exe100%Joe Sandbox ML
                No Antivirus matches
                SourceDetectionScannerLabelLinkDownload
                3.0.file.exe.400000.0.unpack100%AviraTR/ATRAPS.GenDownload File
                0.0.file.exe.aa0000.0.unpack100%AviraHEUR/AGEN.1249296Download File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.carterandcone.com0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://checkip.dyndns.org40%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://checkip.dyndns.org/0%URL Reputationsafe
                http://checkip.dyndns.org/q0%URL Reputationsafe
                http://www.urwpp.de20%URL Reputationsafe
                http://www.founder.com.cn/cn_0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://checkip.dyndns.com0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.urwpp.de0%URL Reputationsafe
                http://www.urwpp.dewa0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.tiro.com#0%URL Reputationsafe
                http://www.carterandcone.como.0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                http://www.galapagosdesign.com/0%URL Reputationsafe
                http://www.carterandcone.come0%URL Reputationsafe
                http://www.carterandcone.comTC0%URL Reputationsafe
                http://www.tiro.comn0%URL Reputationsafe
                http://checkip.dyndns.org0%URL Reputationsafe
                http://www.carterandcone.comt0%URL Reputationsafe
                http://www.zhongyicts.com.cne0%URL Reputationsafe
                http://en.w0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.founder.com.cn/cn/0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.fontbureau.comoitu0%URL Reputationsafe
                http://www.monotype.0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.founder.com.cn/cn9)z0%Avira URL Cloudsafe
                http://www.founder.com.cn/cnn-uAofz0%Avira URL Cloudsafe
                http://www.zhongyicts.com.cnmd0%Avira URL Cloudsafe
                http://www.carterandcone.comuctP0%Avira URL Cloudsafe
                http://www.urwpp.dew0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                checkip.dyndns.com
                193.122.130.0
                truetrue
                  unknown
                  checkip.dyndns.org
                  unknown
                  unknowntrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/true
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.fontbureau.com/designersGfile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designers/?file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bThefile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.telegram.org/botfile.exe, 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          high
                          http://www.zhongyicts.com.cnmdfile.exe, 00000000.00000003.323222872.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323273225.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323456584.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322784264.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322849771.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322819666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323165080.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.com/designers?file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designers/cabarga.html8file.exe, 00000000.00000003.328017976.0000000005DED000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.327948700.0000000005DED000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.tiro.comfile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323570476.0000000005E1E000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323578756.0000000005E1F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322410540.0000000005E1E000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323642134.0000000005E1F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322390325.0000000005E1E000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323539855.0000000005E1E000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322437371.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designersfile.exe, 00000000.00000003.328186440.0000000005DED000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.goodfont.co.krfile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comfile.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cn9)zfile.exe, 00000000.00000003.322190648.0000000005DFB000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.com/designersRfile.exe, 00000000.00000003.328259813.0000000005DED000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sajatypeworks.comfile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://checkip.dyndns.org4file.exe, 00000003.00000002.588190939.0000000003216000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.typography.netDfile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cn/cThefile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/staff/dennis.htmfile.exe, 00000000.00000003.331573813.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.332017649.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331737193.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331448993.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331935801.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331515934.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.332325766.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331681925.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331804071.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.332125875.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.332245431.0000000005DDE000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://fontfabrik.comfile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://checkip.dyndns.org/qfile.exe, 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.de2file.exe, 00000000.00000003.325755043.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.325630110.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.325677616.0000000005DDE000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cn_file.exe, 00000000.00000003.322004645.0000000005DDC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322247274.0000000005DDD000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/DPleasefile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fonts.comfile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.krfile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://checkip.dyndns.comfile.exe, 00000003.00000002.588227793.0000000003222000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.deDPleasefile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.defile.exe, 00000000.00000003.325630110.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.325677616.0000000005DDE000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.dewafile.exe, 00000000.00000003.325630110.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.325677616.0000000005DDE000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cnfile.exe, 00000000.00000003.323222872.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323273225.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323456584.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322784264.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322849771.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322819666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323165080.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.tiro.com#file.exe, 00000000.00000003.322314879.0000000005E1E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefile.exe, 00000003.00000002.587378130.0000000003181000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.carterandcone.como.file.exe, 00000000.00000003.323222872.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323273225.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323456584.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322849771.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323165080.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sakkal.comfile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.apache.org/licenses/LICENSE-2.0file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322654693.0000000005DE6000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fontbureau.comfile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.357757128.0000000005DD0000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.galapagosdesign.com/file.exe, 00000000.00000003.331690866.0000000005DE7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331745202.0000000005DE8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331466240.0000000005DE5000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331580926.0000000005DE7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331524670.0000000005DE5000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.331820779.0000000005DE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/frere-user.htmlhfile.exe, 00000000.00000003.327061644.0000000005DEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.carterandcone.comefile.exe, 00000000.00000003.323222872.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323273225.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323456584.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323165080.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.carterandcone.comTCfile.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.tiro.comnfile.exe, 00000000.00000003.322410540.0000000005E1E000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322390325.0000000005E1E000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://checkip.dyndns.orgfile.exe, 00000003.00000002.588190939.0000000003216000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000003.00000002.588227793.0000000003222000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.carterandcone.comtfile.exe, 00000000.00000003.323222872.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323273225.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323456584.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323165080.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.zhongyicts.com.cnefile.exe, 00000000.00000003.322784264.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322849771.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322819666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://en.wfile.exe, 00000000.00000003.321085020.0000000005DFC000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.carterandcone.comlfile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.founder.com.cn/cn/file.exe, 00000000.00000003.322190648.0000000005DFB000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers/cabarga.htmlNfile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.carterandcone.comuctPfile.exe, 00000000.00000003.323273225.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.323364666.0000000005DFD000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fontbureau.com/designers&file.exe, 00000000.00000003.326503329.0000000005DEA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.327161655.0000000005DEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.founder.com.cn/cnfile.exe, 00000000.00000003.322004645.0000000005DDC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.322040067.0000000005DFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.urwpp.dewfile.exe, 00000000.00000003.325630110.0000000005DDE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.325677616.0000000005DDE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.fontbureau.com/designers/frere-user.htmlfile.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.fontbureau.comoitufile.exe, 00000000.00000003.357757128.0000000005DD0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers/cabarga.htmlfile.exe, 00000000.00000003.327948700.0000000005DED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.founder.com.cn/cnn-uAofzfile.exe, 00000000.00000003.322004645.0000000005DDC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.monotype.file.exe, 00000000.00000003.338369032.0000000005DF7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.338650954.0000000005DF7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.jiyu-kobo.co.jp/file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.com/designers8file.exe, 00000000.00000002.372638789.0000000006FE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.fontbureau.com/designers/hfile.exe, 00000000.00000003.325835624.0000000005DE3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        193.122.130.0
                                                        checkip.dyndns.comUnited States
                                                        31898ORACLE-BMC-31898UStrue
                                                        IP
                                                        192.168.2.1
                                                        Joe Sandbox Version:36.0.0 Rainbow Opal
                                                        Analysis ID:756297
                                                        Start date and time:2022-11-30 00:10:13 +01:00
                                                        Joe Sandbox Product:CloudBasic
                                                        Overall analysis duration:0h 8m 55s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:light
                                                        Sample file name:file.exe
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                        Number of analysed new started processes analysed:9
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • HDC enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.evad.winEXE@8/1@2/2
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HDC Information:Failed
                                                        HCA Information:
                                                        • Successful, ratio: 100%
                                                        • Number of executed functions: 0
                                                        • Number of non-executed functions: 0
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        TimeTypeDescription
                                                        00:11:25API Interceptor1x Sleep call for process: file.exe modified
                                                        No context
                                                        No context
                                                        No context
                                                        No context
                                                        No context
                                                        Process:C:\Users\user\Desktop\file.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1216
                                                        Entropy (8bit):5.355304211458859
                                                        Encrypted:false
                                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                        MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                        SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                        SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                        SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                        Malicious:true
                                                        Reputation:high, very likely benign file
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Entropy (8bit):7.5108050447651635
                                                        TrID:
                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                        • Windows Screen Saver (13104/52) 0.07%
                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                        File name:file.exe
                                                        File size:749056
                                                        MD5:cfc1c66cba07daef1e8ac13d5e042e7a
                                                        SHA1:10451947894a7af9a06adc619179e00e933fb20a
                                                        SHA256:addc1564d69b115e0cb5ff2264614c98dc51107f042e3ea0d93b99e49cf2e94b
                                                        SHA512:40972496a2f5d3f2b2b408c90ef026a7c7df040f31af793da63406c37688278a40f011d28dca9c976c1d566fe28768643d374dae4f9e1967919ee87018492bd5
                                                        SSDEEP:12288:WOvVmqjryPp7LCMYFx6sdzSEACiy4lCfUZ/4J8wRdd0/Ok9:5mqj0xEkyWCfUt4J8wDdo
                                                        TLSH:41F4292297B1C906F93389ED62EC5A014DA860C158B4C949CC573DC05E78E6BF5FCAFA
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..f............... ........@.. ....................................@................................
                                                        Icon Hash:00828e8e8686b000
                                                        Entrypoint:0x4b84fa
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0xA1D69E9C [Sat Jan 15 21:24:44 2056 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                        Instruction
                                                        jmp dword ptr [00402000h]
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xb84a80x4f.text
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xba0000x370.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xbc0000xc.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb848c0x1c.text
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x20000xb65000xb6600False0.7620373543522961data7.516664543280966IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rsrc0xba0000x3700x400False0.36328125data2.7767798139639406IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0xbc0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountry
                                                        RT_VERSION0xba0580x314data
                                                        DLLImport
                                                        mscoree.dll_CorExeMain
                                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                        192.168.2.4193.122.130.049696802039190 11/30/22-00:11:36.516564TCP2039190ET TROJAN 404/Snake/Matiex Keylogger Style External IP Check4969680192.168.2.4193.122.130.0
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Nov 30, 2022 00:11:36.409488916 CET4969680192.168.2.4193.122.130.0
                                                        Nov 30, 2022 00:11:36.515891075 CET8049696193.122.130.0192.168.2.4
                                                        Nov 30, 2022 00:11:36.516032934 CET4969680192.168.2.4193.122.130.0
                                                        Nov 30, 2022 00:11:36.516563892 CET4969680192.168.2.4193.122.130.0
                                                        Nov 30, 2022 00:11:36.623718977 CET8049696193.122.130.0192.168.2.4
                                                        Nov 30, 2022 00:11:36.624381065 CET8049696193.122.130.0192.168.2.4
                                                        Nov 30, 2022 00:11:36.726608992 CET4969680192.168.2.4193.122.130.0
                                                        Nov 30, 2022 00:12:41.628427029 CET8049696193.122.130.0192.168.2.4
                                                        Nov 30, 2022 00:12:41.631309032 CET4969680192.168.2.4193.122.130.0
                                                        Nov 30, 2022 00:13:16.671070099 CET4969680192.168.2.4193.122.130.0
                                                        Nov 30, 2022 00:13:16.779337883 CET8049696193.122.130.0192.168.2.4
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Nov 30, 2022 00:11:36.306314945 CET5657253192.168.2.48.8.8.8
                                                        Nov 30, 2022 00:11:36.323108912 CET53565728.8.8.8192.168.2.4
                                                        Nov 30, 2022 00:11:36.351854086 CET5091153192.168.2.48.8.8.8
                                                        Nov 30, 2022 00:11:36.369916916 CET53509118.8.8.8192.168.2.4
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Nov 30, 2022 00:11:36.306314945 CET192.168.2.48.8.8.80xd6adStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                        Nov 30, 2022 00:11:36.351854086 CET192.168.2.48.8.8.80xb47eStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Nov 30, 2022 00:11:36.323108912 CET8.8.8.8192.168.2.40xd6adNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                        Nov 30, 2022 00:11:36.323108912 CET8.8.8.8192.168.2.40xd6adNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                        Nov 30, 2022 00:11:36.323108912 CET8.8.8.8192.168.2.40xd6adNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                        Nov 30, 2022 00:11:36.323108912 CET8.8.8.8192.168.2.40xd6adNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                        Nov 30, 2022 00:11:36.323108912 CET8.8.8.8192.168.2.40xd6adNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                        Nov 30, 2022 00:11:36.323108912 CET8.8.8.8192.168.2.40xd6adNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                        Nov 30, 2022 00:11:36.369916916 CET8.8.8.8192.168.2.40xb47eNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                        Nov 30, 2022 00:11:36.369916916 CET8.8.8.8192.168.2.40xb47eNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                        Nov 30, 2022 00:11:36.369916916 CET8.8.8.8192.168.2.40xb47eNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                        Nov 30, 2022 00:11:36.369916916 CET8.8.8.8192.168.2.40xb47eNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                        Nov 30, 2022 00:11:36.369916916 CET8.8.8.8192.168.2.40xb47eNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                        Nov 30, 2022 00:11:36.369916916 CET8.8.8.8192.168.2.40xb47eNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                        • checkip.dyndns.org

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:00:11:13
                                                        Start date:30/11/2022
                                                        Path:C:\Users\user\Desktop\file.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Users\user\Desktop\file.exe
                                                        Imagebase:0xaa0000
                                                        File size:749056 bytes
                                                        MD5 hash:CFC1C66CBA07DAEF1E8AC13D5E042E7A
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET
                                                        Yara matches:
                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.365680487.0000000003439000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.367556703.0000000004135000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.370182647.000000000445D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                        Reputation:low

                                                        Target ID:1
                                                        Start time:00:11:29
                                                        Start date:30/11/2022
                                                        Path:C:\Users\user\Desktop\file.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Users\user\Desktop\file.exe
                                                        Imagebase:0x390000
                                                        File size:749056 bytes
                                                        MD5 hash:CFC1C66CBA07DAEF1E8AC13D5E042E7A
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low

                                                        Target ID:2
                                                        Start time:00:11:31
                                                        Start date:30/11/2022
                                                        Path:C:\Users\user\Desktop\file.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Users\user\Desktop\file.exe
                                                        Imagebase:0x350000
                                                        File size:749056 bytes
                                                        MD5 hash:CFC1C66CBA07DAEF1E8AC13D5E042E7A
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low

                                                        Target ID:3
                                                        Start time:00:11:32
                                                        Start date:30/11/2022
                                                        Path:C:\Users\user\Desktop\file.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Users\user\Desktop\file.exe
                                                        Imagebase:0xd80000
                                                        File size:749056 bytes
                                                        MD5 hash:CFC1C66CBA07DAEF1E8AC13D5E042E7A
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET
                                                        Yara matches:
                                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000000.356501796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                        Reputation:low

                                                        Target ID:8
                                                        Start time:00:13:01
                                                        Start date:30/11/2022
                                                        Path:C:\Windows\System32\audiodg.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\AUDIODG.EXE 0x364
                                                        Imagebase:0x7ff6fc6d0000
                                                        File size:594128 bytes
                                                        MD5 hash:0B245353F92DF527AA7613BA2C0DA023
                                                        Has elevated privileges:true
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate

                                                        No disassembly