Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Smh3IA9098.exe

Overview

General Information

Sample Name:Smh3IA9098.exe
Original Sample Name:9b75823d12157891fafe183679b54831.exe
Analysis ID:830845
MD5:9b75823d12157891fafe183679b54831
SHA1:1e074aab3a27aebdefa87f520350109c95b31cf4
SHA256:306a4b507ed783c41a906281904642730d4887aac6dcd5d3ee7ba066d0a51efa
Tags:AgentTeslaexeTelegram
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Telegram RAT
Yara detected AgentTesla
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
May check the online IP address of the machine
Injects a PE file into a foreign processes
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • Smh3IA9098.exe (PID: 1004 cmdline: C:\Users\user\Desktop\Smh3IA9098.exe MD5: 9B75823D12157891FAFE183679B54831)
    • Smh3IA9098.exe (PID: 6132 cmdline: C:\Users\user\Desktop\Smh3IA9098.exe MD5: 9B75823D12157891FAFE183679B54831)
  • cleanup
{"C2 url": "https://api.telegram.org/bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/sendMessage?chat_id=5737638148"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: Smh3IA9098.exe PID: 6132JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: Smh3IA9098.exe PID: 6132JoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            Click to see the 1 entries
            No Sigma rule has matched
            Timestamp:192.168.2.6149.154.167.220497084432851779 03/20/23-18:29:57.946141
            SID:2851779
            Source Port:49708
            Destination Port:443
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Smh3IA9098.exeReversingLabs: Detection: 33%
            Source: Smh3IA9098.exeVirustotal: Detection: 42%Perma Link
            Source: Smh3IA9098.exeJoe Sandbox ML: detected
            Source: 0.2.Smh3IA9098.exe.47d8ae0.5.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/sendMessage?chat_id=5737638148"}
            Source: Smh3IA9098.exe.6132.1.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/sendMessage"}
            Source: Smh3IA9098.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 64.185.227.155:443 -> 192.168.2.6:49707 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49708 version: TLS 1.2
            Source: Smh3IA9098.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: szrO.pdbSHA256 wV source: Smh3IA9098.exe
            Source: Binary string: szrO.pdb source: Smh3IA9098.exe

            Networking

            barindex
            Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.6:49708 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: C:\Users\user\Desktop\Smh3IA9098.exeDNS query: name: api.ipify.org
            Source: C:\Users\user\Desktop\Smh3IA9098.exeDNS query: name: api.ipify.org
            Source: C:\Users\user\Desktop\Smh3IA9098.exeDNS query: name: api.ipify.org
            Source: C:\Users\user\Desktop\Smh3IA9098.exeDNS query: name: api.ipify.org
            Source: C:\Users\user\Desktop\Smh3IA9098.exeDNS query: name: api.ipify.org
            Source: C:\Users\user\Desktop\Smh3IA9098.exeDNS query: name: api.ipify.org
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: global trafficHTTP traffic detected: POST /bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8db29711b5da886Host: api.telegram.orgContent-Length: 981Expect: 100-continueConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 64.185.227.155 64.185.227.155
            Source: Joe Sandbox ViewIP Address: 64.185.227.155 64.185.227.155
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
            Source: Smh3IA9098.exe, 00000001.00000002.522261092.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
            Source: Smh3IA9098.exe, 00000001.00000002.522261092.0000000002B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: Smh3IA9098.exe, 00000001.00000002.522261092.0000000002B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: Smh3IA9098.exe, 00000001.00000002.522261092.0000000002B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: Smh3IA9098.exe, 00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: Smh3IA9098.exe, 00000001.00000002.522261092.0000000002B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/
            Source: Smh3IA9098.exe, 00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/sendDocument
            Source: Smh3IA9098.exe, 00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org4
            Source: unknownHTTP traffic detected: POST /bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8db29711b5da886Host: api.telegram.orgContent-Length: 981Expect: 100-continueConnection: Keep-Alive
            Source: unknownDNS traffic detected: queries for: api.ipify.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 64.185.227.155:443 -> 192.168.2.6:49707 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49708 version: TLS 1.2
            Source: Smh3IA9098.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 0_2_07920391
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 0_2_079203A0
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 0_2_07920100
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 0_2_079200F0
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 0_2_07DB0040
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 0_2_07DB0007
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 1_2_02AAC8B8
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 1_2_02AAA8F8
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 1_2_02AA9CE0
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 1_2_02AAA028
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 1_2_0672F337
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 1_2_0672039C
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 1_2_067230B0
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 1_2_06727CE8
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 1_2_0672EBD3
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 1_2_06728828
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 1_2_0672C8F0
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 1_2_06779A68
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 1_2_0677D918
            Source: Smh3IA9098.exe, 00000000.00000002.275145175.0000000003517000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCruiser.dll, vs Smh3IA9098.exe
            Source: Smh3IA9098.exe, 00000000.00000002.277752013.0000000004449000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOutimurs.dll2 vs Smh3IA9098.exe
            Source: Smh3IA9098.exe, 00000000.00000002.277752013.00000000047AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename4fea6f85-f2e4-4165-ba99-4bd867ae23e9.exe4 vs Smh3IA9098.exe
            Source: Smh3IA9098.exe, 00000000.00000002.275145175.0000000003487000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCruiser.dll, vs Smh3IA9098.exe
            Source: Smh3IA9098.exe, 00000000.00000002.275145175.0000000003487000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename4fea6f85-f2e4-4165-ba99-4bd867ae23e9.exe4 vs Smh3IA9098.exe
            Source: Smh3IA9098.exe, 00000000.00000002.291943272.0000000007B90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameOutimurs.dll2 vs Smh3IA9098.exe
            Source: Smh3IA9098.exe, 00000000.00000000.252707563.0000000001098000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameszrO.exe> vs Smh3IA9098.exe
            Source: Smh3IA9098.exe, 00000001.00000002.520128183.0000000000B38000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Smh3IA9098.exe
            Source: Smh3IA9098.exe, 00000001.00000002.519751255.000000000042C000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename4fea6f85-f2e4-4165-ba99-4bd867ae23e9.exe4 vs Smh3IA9098.exe
            Source: Smh3IA9098.exeBinary or memory string: OriginalFilenameszrO.exe> vs Smh3IA9098.exe
            Source: Smh3IA9098.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: Smh3IA9098.exeReversingLabs: Detection: 33%
            Source: Smh3IA9098.exeVirustotal: Detection: 42%
            Source: Smh3IA9098.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Smh3IA9098.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\Smh3IA9098.exe C:\Users\user\Desktop\Smh3IA9098.exe
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess created: C:\Users\user\Desktop\Smh3IA9098.exe C:\Users\user\Desktop\Smh3IA9098.exe
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess created: C:\Users\user\Desktop\Smh3IA9098.exe C:\Users\user\Desktop\Smh3IA9098.exe
            Source: C:\Users\user\Desktop\Smh3IA9098.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
            Source: C:\Users\user\Desktop\Smh3IA9098.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Smh3IA9098.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Smh3IA9098.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Smh3IA9098.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Smh3IA9098.exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@3/2
            Source: Smh3IA9098.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\Smh3IA9098.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\Smh3IA9098.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\Smh3IA9098.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\Smh3IA9098.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\Smh3IA9098.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\Smh3IA9098.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\Smh3IA9098.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: C:\Users\user\Desktop\Smh3IA9098.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: Smh3IA9098.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: Smh3IA9098.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Smh3IA9098.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: szrO.pdbSHA256 wV source: Smh3IA9098.exe
            Source: Binary string: szrO.pdb source: Smh3IA9098.exe
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 0_2_079235C2 push ss; iretd
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 0_2_0792398A push edx; retf
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 1_2_0672300F push es; ret
            Source: initial sampleStatic PE information: section name: .text entropy: 7.873571070736306
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Smh3IA9098.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\Smh3IA9098.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\Smh3IA9098.exe TID: 4612Thread sleep time: -40023s >= -30000s
            Source: C:\Users\user\Desktop\Smh3IA9098.exe TID: 1432Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\Smh3IA9098.exe TID: 320Thread sleep count: 647 > 30
            Source: C:\Users\user\Desktop\Smh3IA9098.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\Smh3IA9098.exeWindow / User API: threadDelayed 647
            Source: C:\Users\user\Desktop\Smh3IA9098.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Smh3IA9098.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Smh3IA9098.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Smh3IA9098.exeThread delayed: delay time: 40023
            Source: C:\Users\user\Desktop\Smh3IA9098.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\Smh3IA9098.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\Smh3IA9098.exeMemory written: C:\Users\user\Desktop\Smh3IA9098.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\Smh3IA9098.exeProcess created: C:\Users\user\Desktop\Smh3IA9098.exe C:\Users\user\Desktop\Smh3IA9098.exe
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Users\user\Desktop\Smh3IA9098.exe VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Users\user\Desktop\Smh3IA9098.exe VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\Smh3IA9098.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\Desktop\Smh3IA9098.exeCode function: 1_2_02AAF088 GetUserNameW,

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Smh3IA9098.exe PID: 6132, type: MEMORYSTR
            Source: Yara matchFile source: 00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Smh3IA9098.exe PID: 6132, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Smh3IA9098.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Users\user\Desktop\Smh3IA9098.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Users\user\Desktop\Smh3IA9098.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Users\user\Desktop\Smh3IA9098.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Users\user\Desktop\Smh3IA9098.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Source: C:\Users\user\Desktop\Smh3IA9098.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Users\user\Desktop\Smh3IA9098.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Source: Yara matchFile source: 00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Smh3IA9098.exe PID: 6132, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Smh3IA9098.exe PID: 6132, type: MEMORYSTR
            Source: Yara matchFile source: 00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Smh3IA9098.exe PID: 6132, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            Path Interception111
            Process Injection
            1
            Masquerading
            1
            OS Credential Dumping
            11
            Security Software Discovery
            Remote Services1
            Email Collection
            Exfiltration Over Other Network Medium1
            Web Service
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            1
            Credentials in Registry
            131
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            Exfiltration Over Bluetooth11
            Encrypted Channel
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            Automated Exfiltration1
            Ingress Tool Transfer
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
            Process Injection
            NTDS1
            Account Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer3
            Non-Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA Secrets1
            System Owner/User Discovery
            SSHKeyloggingData Transfer Size Limits14
            Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common2
            Software Packing
            Cached Domain Credentials1
            Remote System Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem114
            System Information Discovery
            Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Smh3IA9098.exe33%ReversingLabsWin32.Trojan.AgentTesla
            Smh3IA9098.exe42%VirustotalBrowse
            Smh3IA9098.exe100%Joe Sandbox ML
            No Antivirus matches
            SourceDetectionScannerLabelLinkDownload
            1.2.Smh3IA9098.exe.400000.0.unpack100%AviraHEUR/AGEN.1203035Download File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            https://api.telegram.org40%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            api4.ipify.org
            64.185.227.155
            truefalse
              high
              api.telegram.org
              149.154.167.220
              truefalse
                high
                api.ipify.org
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  https://api.ipify.org/false
                    high
                    https://api.telegram.org/bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/sendDocumentfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.apache.org/licenses/LICENSE-2.0Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designersGSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designers/?Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/bTheSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://api.telegram.orgSmh3IA9098.exe, 00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://api.telegram.org/bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/Smh3IA9098.exe, 00000001.00000002.522261092.0000000002B71000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers?Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.tiro.comSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designersSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.goodfont.co.krSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.carterandcone.comlSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sajatypeworks.comSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.typography.netDSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/cabarga.htmlNSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.founder.com.cn/cn/cTheSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.galapagosdesign.com/staff/dennis.htmSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.ipify.orgSmh3IA9098.exe, 00000001.00000002.522261092.0000000002B71000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://fontfabrik.comSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cnSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.telegram.org4Smh3IA9098.exe, 00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/frere-jones.htmlSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.jiyu-kobo.co.jp/Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/DPleaseSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers8Smh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.fonts.comSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.sandoll.co.krSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.urwpp.deDPleaseSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://www.zhongyicts.com.cnSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://api.telegram.orgSmh3IA9098.exe, 00000001.00000002.522261092.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSmh3IA9098.exe, 00000001.00000002.522261092.0000000002B71000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.sakkal.comSmh3IA9098.exe, 00000000.00000002.280786418.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    149.154.167.220
                                                    api.telegram.orgUnited Kingdom
                                                    62041TELEGRAMRUfalse
                                                    64.185.227.155
                                                    api4.ipify.orgUnited States
                                                    18450WEBNXUSfalse
                                                    Joe Sandbox Version:37.0.0 Beryl
                                                    Analysis ID:830845
                                                    Start date and time:2023-03-20 18:28:35 +01:00
                                                    Joe Sandbox Product:CloudBasic
                                                    Overall analysis duration:0h 8m 16s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:light
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                    Number of analysed new started processes analysed:13
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • HDC enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample file name:Smh3IA9098.exe
                                                    Original Sample Name:9b75823d12157891fafe183679b54831.exe
                                                    Detection:MAL
                                                    Classification:mal100.troj.spyw.evad.winEXE@3/1@3/2
                                                    EGA Information:
                                                    • Successful, ratio: 100%
                                                    HDC Information:Failed
                                                    HCA Information:
                                                    • Successful, ratio: 95%
                                                    • Number of executed functions: 0
                                                    • Number of non-executed functions: 0
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    TimeTypeDescription
                                                    18:29:40API Interceptor1x Sleep call for process: Smh3IA9098.exe modified
                                                    No context
                                                    No context
                                                    No context
                                                    No context
                                                    No context
                                                    Process:C:\Users\user\Desktop\Smh3IA9098.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1216
                                                    Entropy (8bit):5.355304211458859
                                                    Encrypted:false
                                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                    Malicious:true
                                                    Reputation:high, very likely benign file
                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Entropy (8bit):7.864829670852181
                                                    TrID:
                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                    • DOS Executable Generic (2002/1) 0.01%
                                                    File name:Smh3IA9098.exe
                                                    File size:745984
                                                    MD5:9b75823d12157891fafe183679b54831
                                                    SHA1:1e074aab3a27aebdefa87f520350109c95b31cf4
                                                    SHA256:306a4b507ed783c41a906281904642730d4887aac6dcd5d3ee7ba066d0a51efa
                                                    SHA512:963331bc8f3da1acb9054bed209418ec6f08158ceffef04fda67b98a28e42a0908b8481d74100c5f1de329f490866821ca0bd4362539a388280355358bb25347
                                                    SSDEEP:12288:pr9mYMUnFW/NWTzHRYHjwvgRizNIezQMTO3HeX74zfgxYb+ttNNTY+CE5kgesGI:pr9UUvxgj6gQzNIOLc+sDx2jNTt8
                                                    TLSH:5AF402646BA79128F93753BDA6E532814B7E67632713C95D04F211CE0B23B428FD1A3B
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..............0..L...........k... ........@.. ....................................@................................
                                                    Icon Hash:209480e66eb84902
                                                    Entrypoint:0x4b6b82
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x6417B8A5 [Mon Mar 20 01:36:37 2023 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                    Instruction
                                                    jmp dword ptr [00402000h]
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb6b2d0x4f.text
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xb80000x1110.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xba0000xc.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xb57180x54.text
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x20000xb4b880xb4c00False0.9270590205739973data7.873571070736306IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rsrc0xb80000x11100x1200False0.73046875data6.631938259113971IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0xba0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountry
                                                    RT_ICON0xb81000xa79PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                    RT_GROUP_ICON0xb8b8c0x14data
                                                    RT_VERSION0xb8bb00x360data
                                                    RT_MANIFEST0xb8f200x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                    DLLImport
                                                    mscoree.dll_CorExeMain
                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                    192.168.2.6149.154.167.220497084432851779 03/20/23-18:29:57.946141TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49708443192.168.2.6149.154.167.220
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Mar 20, 2023 18:29:44.434194088 CET49707443192.168.2.664.185.227.155
                                                    Mar 20, 2023 18:29:44.434241056 CET4434970764.185.227.155192.168.2.6
                                                    Mar 20, 2023 18:29:44.434357882 CET49707443192.168.2.664.185.227.155
                                                    Mar 20, 2023 18:29:44.462390900 CET49707443192.168.2.664.185.227.155
                                                    Mar 20, 2023 18:29:44.462405920 CET4434970764.185.227.155192.168.2.6
                                                    Mar 20, 2023 18:29:45.065954924 CET4434970764.185.227.155192.168.2.6
                                                    Mar 20, 2023 18:29:45.066037893 CET49707443192.168.2.664.185.227.155
                                                    Mar 20, 2023 18:29:45.093189001 CET49707443192.168.2.664.185.227.155
                                                    Mar 20, 2023 18:29:45.093211889 CET4434970764.185.227.155192.168.2.6
                                                    Mar 20, 2023 18:29:45.093696117 CET4434970764.185.227.155192.168.2.6
                                                    Mar 20, 2023 18:29:45.139694929 CET49707443192.168.2.664.185.227.155
                                                    Mar 20, 2023 18:29:45.335325003 CET49707443192.168.2.664.185.227.155
                                                    Mar 20, 2023 18:29:45.335367918 CET4434970764.185.227.155192.168.2.6
                                                    Mar 20, 2023 18:29:46.803993940 CET4434970764.185.227.155192.168.2.6
                                                    Mar 20, 2023 18:29:46.851273060 CET49707443192.168.2.664.185.227.155
                                                    Mar 20, 2023 18:29:46.976540089 CET4434970764.185.227.155192.168.2.6
                                                    Mar 20, 2023 18:29:46.976711988 CET4434970764.185.227.155192.168.2.6
                                                    Mar 20, 2023 18:29:46.976937056 CET49707443192.168.2.664.185.227.155
                                                    Mar 20, 2023 18:29:46.977456093 CET49707443192.168.2.664.185.227.155
                                                    Mar 20, 2023 18:29:57.801019907 CET49708443192.168.2.6149.154.167.220
                                                    Mar 20, 2023 18:29:57.801071882 CET44349708149.154.167.220192.168.2.6
                                                    Mar 20, 2023 18:29:57.801156998 CET49708443192.168.2.6149.154.167.220
                                                    Mar 20, 2023 18:29:57.801922083 CET49708443192.168.2.6149.154.167.220
                                                    Mar 20, 2023 18:29:57.801939964 CET44349708149.154.167.220192.168.2.6
                                                    Mar 20, 2023 18:29:57.875756979 CET44349708149.154.167.220192.168.2.6
                                                    Mar 20, 2023 18:29:57.875921011 CET49708443192.168.2.6149.154.167.220
                                                    Mar 20, 2023 18:29:57.882587910 CET49708443192.168.2.6149.154.167.220
                                                    Mar 20, 2023 18:29:57.882610083 CET44349708149.154.167.220192.168.2.6
                                                    Mar 20, 2023 18:29:57.882960081 CET44349708149.154.167.220192.168.2.6
                                                    Mar 20, 2023 18:29:57.885320902 CET49708443192.168.2.6149.154.167.220
                                                    Mar 20, 2023 18:29:57.885354996 CET44349708149.154.167.220192.168.2.6
                                                    Mar 20, 2023 18:29:57.927625895 CET44349708149.154.167.220192.168.2.6
                                                    Mar 20, 2023 18:29:57.945914030 CET49708443192.168.2.6149.154.167.220
                                                    Mar 20, 2023 18:29:57.945959091 CET44349708149.154.167.220192.168.2.6
                                                    Mar 20, 2023 18:29:58.040643930 CET44349708149.154.167.220192.168.2.6
                                                    Mar 20, 2023 18:29:58.040755987 CET44349708149.154.167.220192.168.2.6
                                                    Mar 20, 2023 18:29:58.040847063 CET49708443192.168.2.6149.154.167.220
                                                    Mar 20, 2023 18:29:58.041444063 CET49708443192.168.2.6149.154.167.220
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Mar 20, 2023 18:29:44.350991011 CET5859553192.168.2.68.8.8.8
                                                    Mar 20, 2023 18:29:44.371252060 CET53585958.8.8.8192.168.2.6
                                                    Mar 20, 2023 18:29:44.389094114 CET5633153192.168.2.68.8.8.8
                                                    Mar 20, 2023 18:29:44.408740997 CET53563318.8.8.8192.168.2.6
                                                    Mar 20, 2023 18:29:57.782294989 CET5050653192.168.2.68.8.8.8
                                                    Mar 20, 2023 18:29:57.799567938 CET53505068.8.8.8192.168.2.6
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Mar 20, 2023 18:29:44.350991011 CET192.168.2.68.8.8.80x3f2Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                    Mar 20, 2023 18:29:44.389094114 CET192.168.2.68.8.8.80xb099Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                    Mar 20, 2023 18:29:57.782294989 CET192.168.2.68.8.8.80x5711Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Mar 20, 2023 18:29:44.371252060 CET8.8.8.8192.168.2.60x3f2No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                                    Mar 20, 2023 18:29:44.371252060 CET8.8.8.8192.168.2.60x3f2No error (0)api4.ipify.org64.185.227.155A (IP address)IN (0x0001)false
                                                    Mar 20, 2023 18:29:44.371252060 CET8.8.8.8192.168.2.60x3f2No error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                                                    Mar 20, 2023 18:29:44.371252060 CET8.8.8.8192.168.2.60x3f2No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                                    Mar 20, 2023 18:29:44.408740997 CET8.8.8.8192.168.2.60xb099No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                                    Mar 20, 2023 18:29:44.408740997 CET8.8.8.8192.168.2.60xb099No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                                    Mar 20, 2023 18:29:44.408740997 CET8.8.8.8192.168.2.60xb099No error (0)api4.ipify.org64.185.227.155A (IP address)IN (0x0001)false
                                                    Mar 20, 2023 18:29:44.408740997 CET8.8.8.8192.168.2.60xb099No error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                                                    Mar 20, 2023 18:29:57.799567938 CET8.8.8.8192.168.2.60x5711No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                    • api.ipify.org
                                                    • api.telegram.org

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:18:29:32
                                                    Start date:20/03/2023
                                                    Path:C:\Users\user\Desktop\Smh3IA9098.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\Desktop\Smh3IA9098.exe
                                                    Imagebase:0xfe0000
                                                    File size:745984 bytes
                                                    MD5 hash:9B75823D12157891FAFE183679B54831
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Reputation:low

                                                    Target ID:1
                                                    Start time:18:29:41
                                                    Start date:20/03/2023
                                                    Path:C:\Users\user\Desktop\Smh3IA9098.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\Desktop\Smh3IA9098.exe
                                                    Imagebase:0x6d0000
                                                    File size:745984 bytes
                                                    MD5 hash:9B75823D12157891FAFE183679B54831
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.522261092.0000000002BBC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low

                                                    No disassembly