Create Interactive Tour

Windows Analysis Report
#U00d6deme 31842.exe

Overview

General Information

Sample Name:#U00d6deme 31842.exe
Analysis ID:745353
MD5:a7c08e7f65b211c86e71b0a722f5a99e
SHA1:f43d68fdee7e57611b51a933ffe5f10ef4b486d5
SHA256:93efea0105183d17343bfbc418414d76c18c3fb9534a9898a8a43bfc65e20d55
Tags:exegeoSnakeKeyloggerTUR
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AntiVM3
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • #U00d6deme 31842.exe (PID: 2400 cmdline: C:\Users\user\Desktop\#U00d6deme 31842.exe MD5: A7C08E7F65B211C86E71B0A722F5A99E)
    • #U00d6deme 31842.exe (PID: 6128 cmdline: C:\Users\user\Desktop\#U00d6deme 31842.exe MD5: A7C08E7F65B211C86E71B0A722F5A99E)
  • cleanup
{
  "Exfil Mode": "Telegram",
  "Telegram Token": "5310184099:AAGxqu0IL8tjOF6Eq6x2u0gfcHhvuxRwfLU",
  "Telegram ID": "5350445922"
}
SourceRuleDescriptionAuthorStrings
00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x18584:$x1: $%SMTPDV$
        • 0x17246:$x2: $#TheHashHere%&
        • 0x1852c:$x3: %FTPDV$
        • 0x17228:$x4: $%TelegramDv$
        • 0x14c26:$x5: KeyLoggerEventArgs
        • 0x14fbc:$x5: KeyLoggerEventArgs
        • 0x185b0:$m1: | Snake Keylogger
        • 0x18656:$m1: | Snake Keylogger
        • 0x187aa:$m1: | Snake Keylogger
        • 0x188d0:$m1: | Snake Keylogger
        • 0x18a2a:$m1: | Snake Keylogger
        • 0x18550:$m2: Clipboard Logs ID
        • 0x18760:$m2: Screenshot Logs ID
        • 0x18874:$m2: keystroke Logs ID
        • 0x18a60:$m3: SnakePW
        • 0x18738:$m4: \SnakeKeylogger\
        00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x13a42:$a1: get_encryptedPassword
        • 0x13d2e:$a2: get_encryptedUsername
        • 0x1384e:$a3: get_timePasswordChanged
        • 0x13949:$a4: get_passwordField
        • 0x13a58:$a5: set_encryptedPassword
        • 0x15059:$a7: get_logins
        • 0x14fbc:$a10: KeyLoggerEventArgs
        • 0x14c26:$a11: KeyLoggerEventArgsEventHandler
        Click to see the 17 entries
        SourceRuleDescriptionAuthorStrings
        1.0.#U00d6deme 31842.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x1b084:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x1a26d:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x1a6b4:$a4: \Orbitum\User Data\Default\Login Data
        • 0x1b835:$a5: \Kometa\User Data\Default\Login Data
        1.0.#U00d6deme 31842.exe.400000.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          1.0.#U00d6deme 31842.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            1.0.#U00d6deme 31842.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              1.0.#U00d6deme 31842.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 41 entries
                No Sigma rule has matched
                Timestamp:192.168.2.6132.226.247.7349714802039190 11/14/22-08:31:23.751194
                SID:2039190
                Source Port:49714
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: #U00d6deme 31842.exeVirustotal: Detection: 42%Perma Link
                Source: #U00d6deme 31842.exeJoe Sandbox ML: detected
                Source: 1.0.#U00d6deme 31842.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
                Source: 1.0.#U00d6deme 31842.exe.400000.0.unpackMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram Token": "5310184099:AAGxqu0IL8tjOF6Eq6x2u0gfcHhvuxRwfLU", "Telegram ID": "5350445922"}
                Source: #U00d6deme 31842.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: #U00d6deme 31842.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 010063D1h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 01007507h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 01008687h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 0100F539h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 01005F70h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 01007967h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 0100F991h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 01006B10h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 0100EC8Ah
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 01007DC7h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 0100FDE9h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 01008227h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 0100F0E1h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 01006B10h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 01006B10h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 053B0741h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 053B02E9h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 053B0B99h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF7899h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF3771h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF6739h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF5A31h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF89F9h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EFE981h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF48D1h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF4479h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF7441h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF3319h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF62E1h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EFF689h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF55D9h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF85A1h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EFE529h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF4021h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF6FE9h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EFF231h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF5181h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF8149h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EFE0A9h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF3BC9h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF6B91h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EFFAE1h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF5E89h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EFEDD9h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF4D29h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then jmp 05EF7CF1h
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]

                Networking

                barindex
                Source: TrafficSnort IDS: 2039190 ET TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.6:49714 -> 132.226.247.73:80
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeDNS query: name: checkip.dyndns.org
                Source: Yara matchFile source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.423c140.13.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.41fb300.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.421c920.11.raw.unpack, type: UNPACKEDPE
                Source: Joe Sandbox ViewASN Name: UTMEMUS UTMEMUS
                Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: #U00d6deme 31842.exe, 00000001.00000002.515133046.0000000002B13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: #U00d6deme 31842.exe, 00000001.00000002.515133046.0000000002B13000.00000004.00000800.00020000.00000000.sdmp, #U00d6deme 31842.exe, 00000001.00000002.515076727.0000000002B06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: #U00d6deme 31842.exe, 00000001.00000002.514551548.0000000002A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: #U00d6deme 31842.exe, 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, #U00d6deme 31842.exe, 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: #U00d6deme 31842.exe, 00000001.00000002.515076727.0000000002B06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: #U00d6deme 31842.exe, 00000001.00000002.514551548.0000000002A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: #U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: #U00d6deme 31842.exe, 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, #U00d6deme 31842.exe, 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive

                System Summary

                barindex
                Source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.#U00d6deme 31842.exe.41fb300.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.#U00d6deme 31842.exe.41fb300.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.#U00d6deme 31842.exe.41fb300.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.#U00d6deme 31842.exe.41fb300.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: #U00d6deme 31842.exe PID: 2400, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: #U00d6deme 31842.exe PID: 2400, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: #U00d6deme 31842.exe PID: 6128, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: #U00d6deme 31842.exe PID: 6128, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: #U00d6deme 31842.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.#U00d6deme 31842.exe.423c140.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.#U00d6deme 31842.exe.41fb300.12.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.#U00d6deme 31842.exe.41fb300.12.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.#U00d6deme 31842.exe.41fb300.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.#U00d6deme 31842.exe.41fb300.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.#U00d6deme 31842.exe.421c920.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: #U00d6deme 31842.exe PID: 2400, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: #U00d6deme 31842.exe PID: 2400, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: #U00d6deme 31842.exe PID: 6128, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: #U00d6deme 31842.exe PID: 6128, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 0_2_0166C0E4
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 0_2_0166E520
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 0_2_0166E530
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 0_2_05574F70
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 0_2_0557F210
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 0_2_0557F800
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_01006111
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_01007196
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_010083C9
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_0100F291
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_01005587
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_0100A45B
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_010076A8
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_0100F6E7
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_0100E9E1
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_01007B08
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_0100FB41
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_01006B88
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_01007F68
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_0100DFE0
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_0100EE28
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_01007248
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_01006B78
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_01004A98
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_01004AA8
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_0100DFD0
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B0498
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B003F
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B0040
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B4318
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B4309
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B2398
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B2388
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B4FB0
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B4F9F
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B4968
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B4959
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B29E0
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B29CF
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B08F0
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B3678
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B3668
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B16F8
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B16E9
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B3028
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B3018
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B1D38
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B1D48
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B3CB9
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_053B3CC8
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF75F0
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF34C8
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF6490
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF5788
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFB770
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF8750
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFE6D8
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF4628
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF41D0
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF7198
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFD098
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF3070
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF0040
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF6038
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFF3E0
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFC398
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF5330
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF82F8
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFE280
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF3D78
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF6D40
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFEF88
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF4ED8
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF7EA0
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFDE00
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF3920
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF68E8
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFF838
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF5BE0
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF8BA8
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFEB30
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF4A80
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF7A48
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF75E0
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF34B8
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF6483
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFB76D
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF5778
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF8741
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF4619
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF41C0
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF7188
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF3063
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFC020
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF003B
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF6033
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFC01D
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFF3D9
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF5321
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF82E8
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFE27F
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFDDF0
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF3D68
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF6D37
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF4EC8
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF7E90
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF3910
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF68D8
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFF831
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF5BDB
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EFEB20
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF4A70
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_05EF7A3B
                Source: #U00d6deme 31842.exe, 00000000.00000000.248123788.0000000000CC6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamejOJs.exeN vs #U00d6deme 31842.exe
                Source: #U00d6deme 31842.exe, 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs #U00d6deme 31842.exe
                Source: #U00d6deme 31842.exe, 00000000.00000002.278287712.0000000002F81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamejOJs.exeN vs #U00d6deme 31842.exe
                Source: #U00d6deme 31842.exe, 00000000.00000002.278287712.0000000002F81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs #U00d6deme 31842.exe
                Source: #U00d6deme 31842.exe, 00000000.00000002.278287712.0000000002F81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: nl,\\StringFileInfo\\000004B0\\OriginalFilename vs #U00d6deme 31842.exe
                Source: #U00d6deme 31842.exe, 00000000.00000002.290241824.0000000003F81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs #U00d6deme 31842.exe
                Source: #U00d6deme 31842.exe, 00000000.00000002.299726782.0000000007750000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs #U00d6deme 31842.exe
                Source: #U00d6deme 31842.exe, 00000001.00000000.274038769.0000000000422000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs #U00d6deme 31842.exe
                Source: #U00d6deme 31842.exe, 00000001.00000002.512380774.00000000007B7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs #U00d6deme 31842.exe
                Source: #U00d6deme 31842.exeBinary or memory string: OriginalFilenamejOJs.exeN vs #U00d6deme 31842.exe
                Source: #U00d6deme 31842.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: #U00d6deme 31842.exeVirustotal: Detection: 42%
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeFile read: C:\Users\user\Desktop\#U00d6deme 31842.exe:Zone.IdentifierJump to behavior
                Source: #U00d6deme 31842.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\#U00d6deme 31842.exe C:\Users\user\Desktop\#U00d6deme 31842.exe
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess created: C:\Users\user\Desktop\#U00d6deme 31842.exe C:\Users\user\Desktop\#U00d6deme 31842.exe
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess created: C:\Users\user\Desktop\#U00d6deme 31842.exe C:\Users\user\Desktop\#U00d6deme 31842.exe
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\#U00d6deme 31842.exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
                Source: #U00d6deme 31842.exe, 00000001.00000002.515238412.0000000002B2E000.00000004.00000800.00020000.00000000.sdmp, #U00d6deme 31842.exe, 00000001.00000002.515284035.0000000002B3A000.00000004.00000800.00020000.00000000.sdmp, #U00d6deme 31842.exe, 00000001.00000002.515733865.0000000003AED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: #U00d6deme 31842.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, Bufffd??ufffd/?ufffd???.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                Source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, ?u0609???/u07bb?u05c9??.csCryptographic APIs: 'TransformFinalBlock'
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: #U00d6deme 31842.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: #U00d6deme 31842.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: initial sampleStatic PE information: section name: .text entropy: 7.939398842372674
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 00000000.00000002.283087322.0000000003058000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: #U00d6deme 31842.exe PID: 2400, type: MEMORYSTR
                Source: #U00d6deme 31842.exe, 00000000.00000002.283087322.0000000003058000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: #U00d6deme 31842.exe, 00000000.00000002.283087322.0000000003058000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exe TID: 4600Thread sleep time: -42186s >= -30000s
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exe TID: 6092Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeThread delayed: delay time: 42186
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeThread delayed: delay time: 922337203685477
                Source: #U00d6deme 31842.exe, 00000000.00000002.283087322.0000000003058000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: #U00d6deme 31842.exe, 00000000.00000002.283087322.0000000003058000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: #U00d6deme 31842.exe, 00000000.00000002.283087322.0000000003058000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: #U00d6deme 31842.exe, 00000000.00000002.283087322.0000000003058000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeCode function: 1_2_01005587 LdrInitializeThunk,
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, ?u0609???/u07bb?u05c9??.csReference to suspicious API methods: ('???A?', 'MapVirtualKey@user32.dll')
                Source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, u05c9ufffd?u00ab?/t??ufffdufffd.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeMemory written: C:\Users\user\Desktop\#U00d6deme 31842.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeProcess created: C:\Users\user\Desktop\#U00d6deme 31842.exe C:\Users\user\Desktop\#U00d6deme 31842.exe
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Users\user\Desktop\#U00d6deme 31842.exe VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Users\user\Desktop\#U00d6deme 31842.exe VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.423c140.13.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.421c920.11.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.423c140.13.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.41fb300.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.421c920.11.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: #U00d6deme 31842.exe PID: 2400, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: #U00d6deme 31842.exe PID: 6128, type: MEMORYSTR
                Source: Yara matchFile source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.423c140.13.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.421c920.11.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.423c140.13.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.41fb300.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.421c920.11.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: #U00d6deme 31842.exe PID: 2400, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: #U00d6deme 31842.exe PID: 6128, type: MEMORYSTR
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Source: C:\Users\user\Desktop\#U00d6deme 31842.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: Yara matchFile source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.423c140.13.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.421c920.11.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.423c140.13.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.41fb300.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.421c920.11.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: #U00d6deme 31842.exe PID: 2400, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: #U00d6deme 31842.exe PID: 6128, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.423c140.13.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.421c920.11.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.423c140.13.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.41fb300.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.421c920.11.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: #U00d6deme 31842.exe PID: 2400, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: #U00d6deme 31842.exe PID: 6128, type: MEMORYSTR
                Source: Yara matchFile source: 1.0.#U00d6deme 31842.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.423c140.13.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.421c920.11.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.423c140.13.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.41fb300.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U00d6deme 31842.exe.421c920.11.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: #U00d6deme 31842.exe PID: 2400, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: #U00d6deme 31842.exe PID: 6128, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts1
                Native API
                Path Interception111
                Process Injection
                1
                Masquerading
                2
                OS Credential Dumping
                11
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                Exfiltration Over Bluetooth1
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
                Virtualization/Sandbox Evasion
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares2
                Data from Local System
                Automated Exfiltration2
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                Process Injection
                NTDS1
                Remote System Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer12
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Obfuscated Files or Information
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items3
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 745353 Sample: #U00d6deme 31842.exe Startdate: 14/11/2022 Architecture: WINDOWS Score: 100 20 Snort IDS alert for network traffic 2->20 22 Malicious sample detected (through community Yara rule) 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 8 other signatures 2->26 6 #U00d6deme 31842.exe 3 2->6         started        process3 file4 14 C:\Users\user\...\#U00d6deme 31842.exe.log, ASCII 6->14 dropped 28 Injects a PE file into a foreign processes 6->28 10 #U00d6deme 31842.exe 15 2 6->10         started        signatures5 process6 dnsIp7 16 checkip.dyndns.com 132.226.247.73, 49714, 80 UTMEMUS United States 10->16 18 checkip.dyndns.org 10->18 30 Tries to steal Mail credentials (via file / registry access) 10->30 32 Tries to harvest and steal ftp login credentials 10->32 34 Tries to harvest and steal browser information (history, passwords, etc) 10->34 signatures8

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                #U00d6deme 31842.exe43%VirustotalBrowse
                #U00d6deme 31842.exe100%Joe Sandbox ML
                No Antivirus matches
                SourceDetectionScannerLabelLinkDownload
                1.0.#U00d6deme 31842.exe.400000.0.unpack100%AviraTR/ATRAPS.GenDownload File
                SourceDetectionScannerLabelLink
                checkip.dyndns.com0%VirustotalBrowse
                checkip.dyndns.org0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://checkip.dyndns.org0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://checkip.dyndns.org40%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://checkip.dyndns.org/0%URL Reputationsafe
                http://checkip.dyndns.org/q0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://checkip.dyndns.com0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                checkip.dyndns.com
                132.226.247.73
                truetrueunknown
                checkip.dyndns.org
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://checkip.dyndns.org/true
                • URL Reputation: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.apache.org/licenses/LICENSE-2.0#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designersG#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designers/?#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bThe#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.telegram.org/bot#U00d6deme 31842.exe, 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, #U00d6deme 31842.exe, 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designers?#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.tiro.com#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.org#U00d6deme 31842.exe, 00000001.00000002.515133046.0000000002B13000.00000004.00000800.00020000.00000000.sdmp, #U00d6deme 31842.exe, 00000001.00000002.515076727.0000000002B06000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.goodfont.co.kr#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.carterandcone.coml#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.sajatypeworks.com#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://checkip.dyndns.org4#U00d6deme 31842.exe, 00000001.00000002.515076727.0000000002B06000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.typography.netD#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/cabarga.htmlN#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/cThe#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/staff/dennis.htm#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://fontfabrik.com#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cn#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/frere-jones.html#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://checkip.dyndns.org/q#U00d6deme 31842.exe, 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, #U00d6deme 31842.exe, 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/DPlease#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers8#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fonts.com#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.sandoll.co.kr#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://checkip.dyndns.com#U00d6deme 31842.exe, 00000001.00000002.515133046.0000000002B13000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.urwpp.deDPlease#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.zhongyicts.com.cn#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name#U00d6deme 31842.exe, 00000001.00000002.514551548.0000000002A71000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.sakkal.com#U00d6deme 31842.exe, 00000000.00000002.297464730.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        132.226.247.73
                                        checkip.dyndns.comUnited States
                                        16989UTMEMUStrue
                                        Joe Sandbox Version:36.0.0 Rainbow Opal
                                        Analysis ID:745353
                                        Start date and time:2022-11-14 08:30:07 +01:00
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:0h 9m 17s
                                        Hypervisor based Inspection enabled:false
                                        Report type:light
                                        Sample file name:#U00d6deme 31842.exe
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                        Number of analysed new started processes analysed:11
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • HDC enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HDC Information:Failed
                                        HCA Information:
                                        • Successful, ratio: 99%
                                        • Number of executed functions: 0
                                        • Number of non-executed functions: 0
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                        • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        TimeTypeDescription
                                        08:31:14API Interceptor2x Sleep call for process: #U00d6deme 31842.exe modified
                                        No context
                                        No context
                                        No context
                                        No context
                                        No context
                                        Process:C:\Users\user\Desktop\#U00d6deme 31842.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.355304211458859
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                        MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                        SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                        SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                        SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.168631900987332
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        File name:#U00d6deme 31842.exe
                                        File size:750080
                                        MD5:a7c08e7f65b211c86e71b0a722f5a99e
                                        SHA1:f43d68fdee7e57611b51a933ffe5f10ef4b486d5
                                        SHA256:93efea0105183d17343bfbc418414d76c18c3fb9534a9898a8a43bfc65e20d55
                                        SHA512:9439fb0288ebeee44be9c1792e8e7e7d7d2b9f6266feaa301ae55c77b7287e679430457358a89bb0207467fbb87c41ab2bf1cb373934cda3454826082913c42f
                                        SSDEEP:12288:j2j3TCSRSnq19UPHGhrcKejzPOyB07kyLL1XXMQ+:Y+sSMdrqzGyOoyLJnM
                                        TLSH:B4F42BD1F150889BED6B49F1AD2BA53024E3BE9D94A4810C559DBB1B76F3342209FE0F
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....qc..............0.................. ... ....@.. ....................................@................................
                                        Icon Hash:aeacae8eb6a2be00
                                        Entrypoint:0x47021a
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x63719DB4 [Mon Nov 14 01:45:24 2022 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x701c80x4f.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x720000x488c4.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xbc0000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000x6e2200x6e400False0.9334719564909297data7.939398842372674IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0x720000x488c40x48a00False0.0622478754302926data4.758068991646414IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0xbc0000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountry
                                        RT_ICON0x722c80x668Device independent bitmap graphic, 48 x 96 x 4, image size 0
                                        RT_ICON0x729300x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0
                                        RT_ICON0x72c180x128Device independent bitmap graphic, 16 x 32 x 4, image size 0
                                        RT_ICON0x72d400xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
                                        RT_ICON0x73be80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                                        RT_ICON0x744900x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
                                        RT_ICON0x749f80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 0
                                        RT_ICON0xb6a200x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                                        RT_ICON0xb8fc80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                                        RT_ICON0xba0700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                                        RT_GROUP_ICON0xba4d80x92data
                                        RT_GROUP_ICON0xba56c0x14data
                                        RT_VERSION0xba5800x344data
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                        192.168.2.6132.226.247.7349714802039190 11/14/22-08:31:23.751194TCP2039190ET TROJAN 404/Snake/Matiex Keylogger Style External IP Check4971480192.168.2.6132.226.247.73
                                        • Total Packets: 8
                                        • 80 (HTTP)
                                        • 53 (DNS)
                                        TimestampSource PortDest PortSource IPDest IP
                                        Nov 14, 2022 08:31:23.519953012 CET4971480192.168.2.6132.226.247.73
                                        Nov 14, 2022 08:31:23.750277996 CET8049714132.226.247.73192.168.2.6
                                        Nov 14, 2022 08:31:23.750422955 CET4971480192.168.2.6132.226.247.73
                                        Nov 14, 2022 08:31:23.751194000 CET4971480192.168.2.6132.226.247.73
                                        Nov 14, 2022 08:31:23.981339931 CET8049714132.226.247.73192.168.2.6
                                        Nov 14, 2022 08:31:23.982208014 CET8049714132.226.247.73192.168.2.6
                                        Nov 14, 2022 08:31:24.087641954 CET4971480192.168.2.6132.226.247.73
                                        Nov 14, 2022 08:32:28.983093977 CET8049714132.226.247.73192.168.2.6
                                        Nov 14, 2022 08:32:28.983274937 CET4971480192.168.2.6132.226.247.73
                                        Nov 14, 2022 08:33:04.003400087 CET4971480192.168.2.6132.226.247.73
                                        Nov 14, 2022 08:33:04.233684063 CET8049714132.226.247.73192.168.2.6
                                        TimestampSource PortDest PortSource IPDest IP
                                        Nov 14, 2022 08:31:23.407417059 CET5950453192.168.2.68.8.8.8
                                        Nov 14, 2022 08:31:23.424485922 CET53595048.8.8.8192.168.2.6
                                        Nov 14, 2022 08:31:23.450709105 CET6519853192.168.2.68.8.8.8
                                        Nov 14, 2022 08:31:23.467627048 CET53651988.8.8.8192.168.2.6
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Nov 14, 2022 08:31:23.407417059 CET192.168.2.68.8.8.80xe728Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                        Nov 14, 2022 08:31:23.450709105 CET192.168.2.68.8.8.80x5286Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Nov 14, 2022 08:31:23.424485922 CET8.8.8.8192.168.2.60xe728No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                        Nov 14, 2022 08:31:23.424485922 CET8.8.8.8192.168.2.60xe728No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                        Nov 14, 2022 08:31:23.424485922 CET8.8.8.8192.168.2.60xe728No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                        Nov 14, 2022 08:31:23.424485922 CET8.8.8.8192.168.2.60xe728No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                        Nov 14, 2022 08:31:23.424485922 CET8.8.8.8192.168.2.60xe728No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                        Nov 14, 2022 08:31:23.424485922 CET8.8.8.8192.168.2.60xe728No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                        Nov 14, 2022 08:31:23.467627048 CET8.8.8.8192.168.2.60x5286No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                        Nov 14, 2022 08:31:23.467627048 CET8.8.8.8192.168.2.60x5286No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                        Nov 14, 2022 08:31:23.467627048 CET8.8.8.8192.168.2.60x5286No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                        Nov 14, 2022 08:31:23.467627048 CET8.8.8.8192.168.2.60x5286No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                        Nov 14, 2022 08:31:23.467627048 CET8.8.8.8192.168.2.60x5286No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                        Nov 14, 2022 08:31:23.467627048 CET8.8.8.8192.168.2.60x5286No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                        • checkip.dyndns.org
                                        Target ID:0
                                        Start time:08:31:03
                                        Start date:14/11/2022
                                        Path:C:\Users\user\Desktop\#U00d6deme 31842.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\#U00d6deme 31842.exe
                                        Imagebase:0xc50000
                                        File size:750080 bytes
                                        MD5 hash:A7C08E7F65B211C86E71B0A722F5A99E
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.283087322.0000000003058000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.293922658.00000000041FB000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        Reputation:low

                                        Target ID:1
                                        Start time:08:31:15
                                        Start date:14/11/2022
                                        Path:C:\Users\user\Desktop\#U00d6deme 31842.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\#U00d6deme 31842.exe
                                        Imagebase:0x570000
                                        File size:750080 bytes
                                        MD5 hash:A7C08E7F65B211C86E71B0A722F5A99E
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000000.273923077.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                        Reputation:low

                                        No disassembly