Loading ...

Play interactive tourEdit tour

Analysis Report NXKfWP9SPF0XHRu.exe

Overview

General Information

Sample Name:NXKfWP9SPF0XHRu.exe
Analysis ID:319657
MD5:444332a61d888ac4f80db03b3c2129e9
SHA1:5d518f814c09b15b35cd9ba5d20d0892bd8ef90b
SHA256:611c893208d8bf06031da708a44ec749b89b069ad1e84c14625b02bccb4998a0
Tags:ESPexegeoNanoCoreRAT

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to detect virtual machines (SLDT)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • NXKfWP9SPF0XHRu.exe (PID: 5952 cmdline: 'C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe' MD5: 444332A61D888AC4F80DB03B3C2129E9)
    • schtasks.exe (PID: 6052 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ynSazlVxDpCRe' /XML 'C:\Users\user\AppData\Local\Temp\tmp10AA.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xf7ad:$x1: NanoCore.ClientPluginHost
  • 0xf7da:$x2: IClientNetworkHost
00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xf7ad:$x2: NanoCore.ClientPluginHost
  • 0x10888:$s4: PipeCreated
  • 0xf7c7:$s5: IClientLoggingHost
00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x24f68d:$x1: NanoCore.ClientPluginHost
    • 0x24f6ca:$x2: IClientNetworkHost
    • 0x2531fd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 19 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      3.2.NXKfWP9SPF0XHRu.exe.5710000.5.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      3.2.NXKfWP9SPF0XHRu.exe.5710000.5.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xd9ad:$x2: NanoCore.ClientPluginHost
      • 0xea88:$s4: PipeCreated
      • 0xd9c7:$s5: IClientLoggingHost
      3.2.NXKfWP9SPF0XHRu.exe.5710000.5.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        3.2.NXKfWP9SPF0XHRu.exe.5710000.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xf7ad:$x1: NanoCore.ClientPluginHost
        • 0xf7da:$x2: IClientNetworkHost
        3.2.NXKfWP9SPF0XHRu.exe.5710000.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xf7ad:$x2: NanoCore.ClientPluginHost
        • 0x10888:$s4: PipeCreated
        • 0xf7c7:$s5: IClientLoggingHost
        Click to see the 7 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe, ProcessId: 768, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ynSazlVxDpCRe' /XML 'C:\Users\user\AppData\Local\Temp\tmp10AA.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ynSazlVxDpCRe' /XML 'C:\Users\user\AppData\Local\Temp\tmp10AA.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe' , ParentImage: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe, ParentProcessId: 5952, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ynSazlVxDpCRe' /XML 'C:\Users\user\AppData\Local\Temp\tmp10AA.tmp', ProcessId: 6052

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\ynSazlVxDpCRe.exeReversingLabs: Detection: 16%
        Source: C:\Users\user\AppData\Roaming\ynSazlVxDpCRe.exeReversingLabs: Detection: 16%
        Multi AV Scanner detection for submitted fileShow sources
        Source: NXKfWP9SPF0XHRu.exeReversingLabs: Detection: 16%
        Source: NXKfWP9SPF0XHRu.exeReversingLabs: Detection: 16%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.253518250.000000000398D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.511185145.0000000003EE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.505689991.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 5952, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 768, type: MEMORY
        Source: Yara matchFile source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, type: UNPACKEDPE
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 4x nop then jmp 05495DF9h
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 4x nop then jmp 05495DF9h
        Source: global trafficTCP traffic: 192.168.2.7:49707 -> 23.105.131.214:4040
        Source: global trafficTCP traffic: 192.168.2.7:49707 -> 23.105.131.214:4040
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.214
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmp, NXKfWP9SPF0XHRu.exe, 00000000.00000003.239916983.0000000004C74000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comadi
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240460926.0000000004C6B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comefaD
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comM.TTFh
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255001568.0000000004C60000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdE
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdL
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comessed)
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comituF
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comlicF
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comoa
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmp, NXKfWP9SPF0XHRu.exe, 00000000.00000003.239663209.0000000004C70000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.239663209.0000000004C70000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmp, NXKfWP9SPF0XHRu.exe, 00000000.00000003.240252277.0000000004C6B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240762052.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/)
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240460926.0000000004C6B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/7
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240252277.0000000004C6B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Bold
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/E
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/a
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/h
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmp, NXKfWP9SPF0XHRu.exe, 00000000.00000003.240460926.0000000004C6B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240678890.0000000004C69000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/)
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/7
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240460926.0000000004C6B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/h
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/roso
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/v
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240460926.0000000004C6B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/vvU
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmp, NXKfWP9SPF0XHRu.exe, 00000000.00000003.239916983.0000000004C74000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comadi
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240460926.0000000004C6B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comefaD
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comM.TTFh
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255001568.0000000004C60000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdE
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdL
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comessed)
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comituF
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comlicF
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comoa
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmp, NXKfWP9SPF0XHRu.exe, 00000000.00000003.239663209.0000000004C70000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.239663209.0000000004C70000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmp, NXKfWP9SPF0XHRu.exe, 00000000.00000003.240252277.0000000004C6B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240762052.0000000004C6A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/)
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240460926.0000000004C6B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/7
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240252277.0000000004C6B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Bold
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/E
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/a
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/h
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmp, NXKfWP9SPF0XHRu.exe, 00000000.00000003.240460926.0000000004C6B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240678890.0000000004C69000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/)
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/7
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240460926.0000000004C6B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/h
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/roso
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/v
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000003.240460926.0000000004C6B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/vvU
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.250650891.00000000008D8000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.250650891.00000000008D8000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.253518250.000000000398D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.511185145.0000000003EE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.505689991.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 5952, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 768, type: MEMORY
        Source: Yara matchFile source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.253518250.000000000398D000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.253518250.000000000398D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000003.00000002.511185145.0000000003EE7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000003.00000002.505689991.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000003.00000002.505689991.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000003.00000002.512006874.0000000005200000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 5952, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 5952, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 768, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 768, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5200000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.253518250.000000000398D000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.253518250.000000000398D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000003.00000002.511185145.0000000003EE7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000003.00000002.505689991.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000003.00000002.505689991.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000003.00000002.512006874.0000000005200000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 5952, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 5952, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 768, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 768, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5200000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_05411756 NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_05411756 NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_0504116A NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_0504112F NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A74C88
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A7D8C0
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A7A238
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A787A0
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A711F8
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A71B21
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A70B18
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A72978
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A74AA0
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A740B8
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A72888
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A79488
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A74A90
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A70099
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A746E0
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A740C8
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A746D0
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A71620
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A73661
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A74C77
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A73670
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A70A7F
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A74840
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A74850
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A78791
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A78100
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A78110
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A78B48
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A74358
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_05493A5C
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_054950A7
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_05493F3C
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_05493ABA
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A74C88
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A7D8C0
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A7A238
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A787A0
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A711F8
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A71B21
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A70B18
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A72978
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A74AA0
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A740B8
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A72888
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A79488
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A74A90
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A70099
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A746E0
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A740C8
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A746D0
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A71620
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A73661
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A74C77
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A73670
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A70A7F
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A74840
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A74850
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A78791
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A78100
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A78110
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A78B48
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A74358
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_05493A5C
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_054950A7
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_05493F3C
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_05493ABA
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_02AF2FA8
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_02AF23A0
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_02AFACC8
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_02AF9068
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_02AF8468
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_02AF3850
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_02AF306F
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_02AF912F
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_02AF9910
        Source: NXKfWP9SPF0XHRu.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: ynSazlVxDpCRe.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: NXKfWP9SPF0XHRu.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: ynSazlVxDpCRe.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: NXKfWP9SPF0XHRu.exeBinary or memory string: OriginalFilename vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.257068238.0000000005B30000.00000002.00000001.sdmpBinary or memory string: originalfilename vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.257068238.0000000005B30000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameB2B.exe4 vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.256985235.0000000005A50000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.258006053.00000000070C0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.257045055.0000000005AC0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMARCUS.dll4 vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.509434462.0000000002EA1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512537276.0000000005FC0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000000.248853862.0000000000810000.00000002.00020000.sdmpBinary or memory string: OriginalFilename vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.511937278.0000000005190000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.507771480.0000000002B40000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exeBinary or memory string: OriginalFilename vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exeBinary or memory string: OriginalFilename vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.257068238.0000000005B30000.00000002.00000001.sdmpBinary or memory string: originalfilename vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.257068238.0000000005B30000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameB2B.exe4 vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.256985235.0000000005A50000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.258006053.00000000070C0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.257045055.0000000005AC0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMARCUS.dll4 vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.509434462.0000000002EA1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512537276.0000000005FC0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000000.248853862.0000000000810000.00000002.00020000.sdmpBinary or memory string: OriginalFilename vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.511937278.0000000005190000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.507771480.0000000002B40000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs NXKfWP9SPF0XHRu.exe
        Source: NXKfWP9SPF0XHRu.exeBinary or memory string: OriginalFilename vs NXKfWP9SPF0XHRu.exe
        Source: 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.253518250.000000000398D000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.253518250.000000000398D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000003.00000002.511185145.0000000003EE7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000003.00000002.505689991.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000003.00000002.505689991.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000003.00000002.512006874.0000000005200000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000003.00000002.512006874.0000000005200000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 5952, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 5952, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 768, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 768, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5200000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5200000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.253518250.000000000398D000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.253518250.000000000398D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000003.00000002.511185145.0000000003EE7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000003.00000002.505689991.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000003.00000002.505689991.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000003.00000002.512006874.0000000005200000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000003.00000002.512006874.0000000005200000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 5952, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 5952, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 768, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 768, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5200000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.5200000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@6/4@0/1
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_054115DA AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_054115DA AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_05040F2A AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_05040EF3 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile created: C:\Users\user\AppData\Roaming\ynSazlVxDpCRe.exeJump to behavior
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile created: C:\Users\user\AppData\Roaming\ynSazlVxDpCRe.exeJump to behavior
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeMutant created: \Sessions\1\BaseNamedObjects\wOaZzcrdioFDiVf
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{9f1637ca-7a2a-4aa5-bf17-8e7b7d705552}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6092:120:WilError_01
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeMutant created: \Sessions\1\BaseNamedObjects\wOaZzcrdioFDiVf
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{9f1637ca-7a2a-4aa5-bf17-8e7b7d705552}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6092:120:WilError_01
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile created: C:\Users\user\AppData\Local\Temp\tmp10AA.tmpJump to behavior
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile created: C:\Users\user\AppData\Local\Temp\tmp10AA.tmpJump to behavior
        Source: NXKfWP9SPF0XHRu.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: NXKfWP9SPF0XHRu.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: NXKfWP9SPF0XHRu.exeReversingLabs: Detection: 16%
        Source: NXKfWP9SPF0XHRu.exeReversingLabs: Detection: 16%
        Source: NXKfWP9SPF0XHRu.exeString found in binary or memory: icons8-Add-16
        Source: NXKfWP9SPF0XHRu.exeString found in binary or memory: es>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries> <AllowHardTerminate>false</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvail
        Source: NXKfWP9SPF0XHRu.exeString found in binary or memory: es>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries> <AllowHardTerminate>false</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvail
        Source: NXKfWP9SPF0XHRu.exeString found in binary or memory: ble> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>false</Hidden> <RunOnlyIfIdle
        Source: NXKfWP9SPF0XHRu.exeString found in binary or memory: ble> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>false</Hidden> <RunOnlyIfIdle
        Source: NXKfWP9SPF0XHRu.exeString found in binary or memory: icons8-Add-16
        Source: NXKfWP9SPF0XHRu.exeString found in binary or memory: icons8-Add-16
        Source: NXKfWP9SPF0XHRu.exeString found in binary or memory: icons8-Add-16
        Source: NXKfWP9SPF0XHRu.exeString found in binary or memory: es>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries> <AllowHardTerminate>false</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvail
        Source: NXKfWP9SPF0XHRu.exeString found in binary or memory: es>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries> <AllowHardTerminate>false</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvail
        Source: NXKfWP9SPF0XHRu.exeString found in binary or memory: ble> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>false</Hidden> <RunOnlyIfIdle
        Source: NXKfWP9SPF0XHRu.exeString found in binary or memory: ble> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>false</Hidden> <RunOnlyIfIdle
        Source: NXKfWP9SPF0XHRu.exeString found in binary or memory: icons8-Add-16
        Source: NXKfWP9SPF0XHRu.exeString found in binary or memory: icons8-Add-16
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile read: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeJump to behavior
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile read: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe 'C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ynSazlVxDpCRe' /XML 'C:\Users\user\AppData\Local\Temp\tmp10AA.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe {path}
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ynSazlVxDpCRe' /XML 'C:\Users\user\AppData\Local\Temp\tmp10AA.tmp'
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess created: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe {path}
        Source: unknownProcess created: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe 'C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ynSazlVxDpCRe' /XML 'C:\Users\user\AppData\Local\Temp\tmp10AA.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe {path}
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ynSazlVxDpCRe' /XML 'C:\Users\user\AppData\Local\Temp\tmp10AA.tmp'
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess created: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe {path}
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: NXKfWP9SPF0XHRu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: NXKfWP9SPF0XHRu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: NXKfWP9SPF0XHRu.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: NXKfWP9SPF0XHRu.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: NXKfWP9SPF0XHRu.exeStatic file information: File size 1117184 > 1048576
        Source: NXKfWP9SPF0XHRu.exeStatic file information: File size 1117184 > 1048576
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: NXKfWP9SPF0XHRu.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x10c600
        Source: NXKfWP9SPF0XHRu.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x10c600
        Source: NXKfWP9SPF0XHRu.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: NXKfWP9SPF0XHRu.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: mscorrc.pdb source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.256985235.0000000005A50000.00000002.00000001.sdmp, NXKfWP9SPF0XHRu.exe, 00000003.00000002.511937278.0000000005190000.00000002.00000001.sdmp
        Source: Binary string: mscorrc.pdb source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.256985235.0000000005A50000.00000002.00000001.sdmp, NXKfWP9SPF0XHRu.exe, 00000003.00000002.511937278.0000000005190000.00000002.00000001.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_001A4825 push ecx; retf
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_001A317F pushfd ; ret
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_001A2A7C pushfd ; iretd
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_001A23B3 pushad ; iretd
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_001A5EF8 push es; retf
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_001A2CF6 push ds; ret
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A792C8 pushfd ; iretd
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_001A4825 push ecx; retf
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_001A317F pushfd ; ret
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_001A2A7C pushfd ; iretd
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_001A23B3 pushad ; iretd
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_001A5EF8 push es; retf
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_001A2CF6 push ds; ret
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_04A792C8 pushfd ; iretd
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_00702A7C pushfd ; iretd
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_0070317F pushfd ; ret
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_00704825 push ecx; retf
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_00702CF6 push ds; ret
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_00705EF8 push es; retf
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_007023B3 pushad ; iretd
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_010F9D30 pushad ; retf
        Source: initial sampleStatic PE information: section name: .text entropy: 7.38603476189
        Source: initial sampleStatic PE information: section name: .text entropy: 7.38603476189
        Source: initial sampleStatic PE information: section name: .text entropy: 7.38603476189
        Source: initial sampleStatic PE information: section name: .text entropy: 7.38603476189
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile created: C:\Users\user\AppData\Roaming\ynSazlVxDpCRe.exeJump to dropped file
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile created: C:\Users\user\AppData\Roaming\ynSazlVxDpCRe.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ynSazlVxDpCRe' /XML 'C:\Users\user\AppData\Local\Temp\tmp10AA.tmp'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ynSazlVxDpCRe' /XML 'C:\Users\user\AppData\Local\Temp\tmp10AA.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile opened: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile opened: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM_3Show sources
        Source: Yara matchFile source: 00000000.00000002.251828506.0000000002994000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 5952, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLLX1
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAMEX1
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLLX1
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAMEX1
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_053B09AA sldt word ptr [eax]
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 0_2_053B09AA sldt word ptr [eax]
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeWindow / User API: threadDelayed 706
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeWindow / User API: threadDelayed 630
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeWindow / User API: foregroundWindowGot 897
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeWindow / User API: threadDelayed 706
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeWindow / User API: threadDelayed 630
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeWindow / User API: foregroundWindowGot 897
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe TID: 4612Thread sleep time: -41500s >= -30000s
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe TID: 4600Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe TID: 4464Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe TID: 3388Thread sleep time: -120000s >= -30000s
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe TID: 4612Thread sleep time: -41500s >= -30000s
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe TID: 4600Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe TID: 4464Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe TID: 3388Thread sleep time: -120000s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_05040BB6 GetSystemInfo,
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_05040BB6 GetSystemInfo,
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMware
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: vmwareX1
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMWARE|9
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: q#"SOFTWARE\VMware, Inc.\VMware ToolsX1
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512537276.0000000005FC0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: q&%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\X1
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMware|9
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIX1
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMware |9
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512537276.0000000005FC0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512537276.0000000005FC0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: VMWAREX1
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMware
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: QEMUX1
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512537276.0000000005FC0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMware
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: vmwareX1
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMWARE|9
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: q#"SOFTWARE\VMware, Inc.\VMware ToolsX1
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512537276.0000000005FC0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: q&%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\X1
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMware|9
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIX1
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMware |9
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512537276.0000000005FC0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512537276.0000000005FC0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: VMWAREX1
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMware
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.251736949.0000000002951000.00000004.00000001.sdmpBinary or memory string: QEMUX1
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253243662.0000000002CD6000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.512537276.0000000005FC0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeMemory allocated: page read and write | page guard
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeMemory written: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeMemory written: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ynSazlVxDpCRe' /XML 'C:\Users\user\AppData\Local\Temp\tmp10AA.tmp'
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess created: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe {path}
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ynSazlVxDpCRe' /XML 'C:\Users\user\AppData\Local\Temp\tmp10AA.tmp'
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeProcess created: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe {path}
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.507540733.0000000001560000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.510272832.0000000002F30000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.507540733.0000000001560000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.507540733.0000000001560000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.510272832.0000000002F30000.00000004.00000001.sdmpBinary or memory string: Program Managerp
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.510928937.00000000030E8000.00000004.00000001.sdmpBinary or memory string: Program ManagerHs
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.507540733.0000000001560000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.510928937.00000000030E8000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.507540733.0000000001560000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.510272832.0000000002F30000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.507540733.0000000001560000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.507540733.0000000001560000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.510272832.0000000002F30000.00000004.00000001.sdmpBinary or memory string: Program Managerp
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.510928937.00000000030E8000.00000004.00000001.sdmpBinary or memory string: Program ManagerHs
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.507540733.0000000001560000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.510928937.00000000030E8000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_010EAF9A GetUserNameW,
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_010EAF9A GetUserNameW,
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.253518250.000000000398D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.511185145.0000000003EE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.505689991.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 5952, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 768, type: MEMORY
        Source: Yara matchFile source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.509434462.0000000002EA1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.509434462.0000000002EA1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: NXKfWP9SPF0XHRu.exe, 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.509434462.0000000002EA1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: NXKfWP9SPF0XHRu.exe, 00000003.00000002.509434462.0000000002EA1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.253518250.000000000398D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.511185145.0000000003EE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.505689991.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 5952, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NXKfWP9SPF0XHRu.exe PID: 768, type: MEMORY
        Source: Yara matchFile source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.NXKfWP9SPF0XHRu.exe.5710000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack, type: UNPACKEDPE
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_05042386 bind,
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_05042353 bind,
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_05042386 bind,
        Source: C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exeCode function: 3_2_05042353 bind,

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsCommand and Scripting Interpreter2Scheduled Task/Job1Access Token Manipulation1Masquerading1Input Capture21Security Software Discovery211Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsProcess Injection112Virtualization/Sandbox Evasion4LSASS MemoryVirtualization/Sandbox Evasion4Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Disable or Modify Tools1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection112LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobObfuscated Files or Information3Proc FilesystemSystem Information Discovery13Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing12/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        NXKfWP9SPF0XHRu.exe17%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\ynSazlVxDpCRe.exe17%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        3.2.NXKfWP9SPF0XHRu.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://www.fontbureau.comoa0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/70%VirustotalBrowse
        http://www.jiyu-kobo.co.jp/jp/70%Avira URL Cloudsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.carterandcone.comefaD0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/roso0%Avira URL Cloudsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/70%Avira URL Cloudsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/h0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/)0%Avira URL Cloudsafe
        http://www.carterandcone.comadi0%Avira URL Cloudsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.fontbureau.comlicF0%Avira URL Cloudsafe
        http://www.fontbureau.comessed)0%Avira URL Cloudsafe
        http://www.fontbureau.comF0%URL Reputationsafe
        http://www.fontbureau.comF0%URL Reputationsafe
        http://www.fontbureau.comF0%URL Reputationsafe
        http://www.fontbureau.comM.TTFh0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/E0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.fontbureau.comituF0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/v0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/)0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/vvU0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.fontbureau.comdE0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/h0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/h0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/h0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/a0%Avira URL Cloudsafe
        http://www.fontbureau.comdL0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Bold0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        No contacted domains info

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.fontbureau.comoaNXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designersGNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
          high
          http://www.fontbureau.com/designers/?NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
            high
            http://www.founder.com.cn/cn/bTheNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers?NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
              high
              http://www.tiro.comNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designersNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                high
                http://www.goodfont.co.krNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.carterandcone.comNXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmp, NXKfWP9SPF0XHRu.exe, 00000000.00000003.239916983.0000000004C74000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/jp/7NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.sajatypeworks.comNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.carterandcone.comefaDNXKfWP9SPF0XHRu.exe, 00000000.00000003.240460926.0000000004C6B000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp/rosoNXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.typography.netDNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn/cTheNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.galapagosdesign.com/staff/dennis.htmNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/7NXKfWP9SPF0XHRu.exe, 00000000.00000003.240460926.0000000004C6B000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://fontfabrik.comNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/jp/hNXKfWP9SPF0XHRu.exe, 00000000.00000003.240460926.0000000004C6B000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.galapagosdesign.com/DPleaseNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/)NXKfWP9SPF0XHRu.exe, 00000000.00000003.240762052.0000000004C6A000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.carterandcone.comadiNXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fonts.comNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                  high
                  http://www.sandoll.co.krNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.urwpp.deDPleaseNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.zhongyicts.com.cnNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.sakkal.comNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.comlicFNXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.apache.org/licenses/LICENSE-2.0NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                    high
                    http://www.fontbureau.comNXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpfalse
                      high
                      http://www.fontbureau.comessed)NXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.fontbureau.comFNXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comM.TTFhNXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/ENXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmp, NXKfWP9SPF0XHRu.exe, 00000000.00000003.240460926.0000000004C6B000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comaNXKfWP9SPF0XHRu.exe, 00000000.00000002.255001568.0000000004C60000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/NXKfWP9SPF0XHRu.exe, 00000000.00000003.239663209.0000000004C70000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                        high
                        http://www.fontbureau.comituFNXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.founder.com.cn/cnNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmp, NXKfWP9SPF0XHRu.exe, 00000000.00000003.239663209.0000000004C70000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-jones.htmlNXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/vNXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/jp/)NXKfWP9SPF0XHRu.exe, 00000000.00000003.240678890.0000000004C69000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/vvUNXKfWP9SPF0XHRu.exe, 00000000.00000003.240460926.0000000004C6B000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/NXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmp, NXKfWP9SPF0XHRu.exe, 00000000.00000003.240252277.0000000004C6B000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comdENXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.com/designers8NXKfWP9SPF0XHRu.exe, 00000000.00000002.255243254.0000000004E72000.00000004.00000001.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/hNXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/aNXKfWP9SPF0XHRu.exe, 00000000.00000003.240900347.0000000004C68000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comdLNXKfWP9SPF0XHRu.exe, 00000000.00000003.241684541.0000000004C6A000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/BoldNXKfWP9SPF0XHRu.exe, 00000000.00000003.240252277.0000000004C6B000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown

                            Contacted IPs

                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs

                            Public

                            IPDomainCountryFlagASNASN NameMalicious
                            23.105.131.214
                            unknownUnited States
                            396362LEASEWEB-USA-NYC-11USfalse

                            General Information

                            Joe Sandbox Version:31.0.0 Red Diamond
                            Analysis ID:319657
                            Start date:18.11.2020
                            Start time:14:24:04
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 7m 33s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:NXKfWP9SPF0XHRu.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:13
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@6/4@0/1
                            EGA Information:Failed
                            HDC Information:
                            • Successful, ratio: 4.3% (good quality ratio 2.5%)
                            • Quality average: 36.9%
                            • Quality standard deviation: 37.2%
                            HCA Information:
                            • Successful, ratio: 95%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Found application associated with file extension: .exe
                            Warnings:
                            Show All
                            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                            • TCP Packets have been reduced to 100
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.

                            Simulations

                            Behavior and APIs

                            TimeTypeDescription
                            14:25:00API Interceptor1032x Sleep call for process: NXKfWP9SPF0XHRu.exe modified

                            Joe Sandbox View / Context

                            IPs

                            No context

                            Domains

                            No context

                            ASN

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            LEASEWEB-USA-NYC-11USDOC.exeGet hashmaliciousBrowse
                            • 23.105.131.162
                            Shipping_Details.exeGet hashmaliciousBrowse
                            • 23.105.131.165
                            2AyWKsCvVF.exeGet hashmaliciousBrowse
                            • 192.253.246.143
                            tn9jVPvlMSqAUX5.exeGet hashmaliciousBrowse
                            • 23.105.131.229
                            HLiw2LPA8i.rtfGet hashmaliciousBrowse
                            • 192.253.246.143
                            TDToxqrclL.exeGet hashmaliciousBrowse
                            • 23.105.131.177
                            Ziiq5tI3CT.exeGet hashmaliciousBrowse
                            • 23.105.131.239
                            f3wo2FuLN6.exeGet hashmaliciousBrowse
                            • 192.253.246.143
                            ORDER INQUIRY.pdf.exeGet hashmaliciousBrowse
                            • 23.105.131.177
                            Purchase Order 4500033557.pdf.exeGet hashmaliciousBrowse
                            • 23.105.131.177
                            SecuriteInfo.com.Trojan.DownLoader35.34609.25775.exeGet hashmaliciousBrowse
                            • 192.253.246.138
                            Proof_of_payment.xlsmGet hashmaliciousBrowse
                            • 23.105.131.217
                            invoice tax.xlsmGet hashmaliciousBrowse
                            • 23.105.131.217
                            SHIPPING DOCUMENTS.pdf.exeGet hashmaliciousBrowse
                            • 23.105.131.177
                            Payment_Order_20201111.xlsxGet hashmaliciousBrowse
                            • 192.253.246.138
                            TLpMnhJmg7.exeGet hashmaliciousBrowse
                            • 192.253.246.143
                            HDyADDoI3I.exeGet hashmaliciousBrowse
                            • 192.253.246.143
                            11.exeGet hashmaliciousBrowse
                            • 173.234.155.145
                            53C29QAJnd.exeGet hashmaliciousBrowse
                            • 173.234.155.145
                            OMQZvmAmCj.exeGet hashmaliciousBrowse
                            • 173.234.155.145

                            JA3 Fingerprints

                            No context

                            Dropped Files

                            No context

                            Created / dropped Files

                            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\NXKfWP9SPF0XHRu.exe.log
                            Process:C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):641
                            Entropy (8bit):5.271473536084351
                            Encrypted:false
                            SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70U2u7x5I6Hi0Ug+9Yz9tv:MLF20NaL329hJ5g522rW2I3rOz2T
                            MD5:C3EC08CD6BEA8576070D5A52B4B6D7D0
                            SHA1:40B95253F98B3CC5953100C0E71DAC7915094A5A
                            SHA-256:28B314C3E5651414FD36B2A65B644A2A55F007A34A536BE17514E12CEE5A091B
                            SHA-512:5B0E6398A092F08240DC6765425E16DB52F32542FF7250E87403C407E54B3660EF93E0EAD17BA2CEF6B666951ACF66FA0EAD61FB52E80867DDD398E8258DED22
                            Malicious:true
                            Reputation:moderate, very likely benign file
                            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Web\d05d469d89b319a068f2123e7e6f8621\System.Web.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                            C:\Users\user\AppData\Local\Temp\tmp10AA.tmp
                            Process:C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1662
                            Entropy (8bit):5.176645564878553
                            Encrypted:false
                            SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB9tn:cbhH7MlNQ8/rydbz9I3YODOLNdq3F
                            MD5:FA36D3CC836AD8E1BADA121233E83614
                            SHA1:0DE7C6F513638E8B5E51C10C120D72BE6597FE08
                            SHA-256:0B393495206B3678363CAAE0231816475DAB2549E90F3F0F4C604B87BB20CB52
                            SHA-512:70DB8009383D2B11EED52570BAD37F5C30265EE8C8327E8582BA5118F14E17812FB61F69BE7C2B8E4114AB6B335CFE746442B30CEA58E95BD1DF22D36CF16306
                            Malicious:true
                            Reputation:low
                            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                            Process:C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):8
                            Entropy (8bit):3.0
                            Encrypted:false
                            SSDEEP:3:tLujP:5CP
                            MD5:E78B48E8D621A403BFAB625F1C92B04C
                            SHA1:E7A09F8F0B049DD57A0540A4AF40AF6A5D523676
                            SHA-256:D898054E52D71F403A89EB5D4B16B2E5221320ADE9D664FA3C8D72FC25D3DF8B
                            SHA-512:810437550F308D974262BDBE620BFC9DAC23AB85E044B9972ED8BC4CCBA66E617B1AC1389E1A56E0919B10176CC63EC495B4A472DD0CB9A0CC4F70137F819B40
                            Malicious:true
                            Reputation:low
                            Preview: .=.....H
                            C:\Users\user\AppData\Roaming\ynSazlVxDpCRe.exe
                            Process:C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1117184
                            Entropy (8bit):7.378881785743249
                            Encrypted:false
                            SSDEEP:12288:VyrKywLz229e7sGJ3UogQpht8LFOcc6WkFR+wn3+0vCi/2mD0eIjAgC46H3Wsmij:VV29l19pv8bWkbr3nd2+sgT3c05s
                            MD5:444332A61D888AC4F80DB03B3C2129E9
                            SHA1:5D518F814C09B15B35CD9BA5D20D0892BD8EF90B
                            SHA-256:611C893208D8BF06031DA708A44EC749B89B069AD1E84C14625B02BCCB4998A0
                            SHA-512:699618863E73B9A748A54002847817C66D4582D70CB740C13AC24AD8C26AC050CA68A2B4BF84AA5594977B30B37EAA4B60D361B3C7C0E4D35A77AB66CF12DA67
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 17%
                            Reputation:low
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...q.._..............0......D......~.... ........@.. ....................................@.................................0...K........A...................`....................................................... ............... ..H............text........ ...................... ..`.rsrc....A.......B..................@..@.reloc.......`......................@..B................`.......H.......H,..............................................................5......U.?...%....*..>M|.u?Ls..5....|...C..Z.P.z.......D.uj.b............h...q...N...Tf.J!.L.i...uU. p../rR./oe....;...?0....B..>e.K.A..(.0.........TZ......h;P8.....vc.Q.s<.sp+..K.*....~..;...4..bn..`e,<s.E&f...4.=..N.C..P.x.g.G..s?...e.......r.b.P8M.....KbN.......d~.u..5..F.:..y..^g.....X....V.:..@.....4+.Y7.}:_.rC'.......9..A...\........c1..S....b.;...:.......fc+.......":(..V

                            Static File Info

                            General

                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.378881785743249
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                            • Win32 Executable (generic) a (10002005/4) 49.75%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Windows Screen Saver (13104/52) 0.07%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            File name:NXKfWP9SPF0XHRu.exe
                            File size:1117184
                            MD5:444332a61d888ac4f80db03b3c2129e9
                            SHA1:5d518f814c09b15b35cd9ba5d20d0892bd8ef90b
                            SHA256:611c893208d8bf06031da708a44ec749b89b069ad1e84c14625b02bccb4998a0
                            SHA512:699618863e73b9a748a54002847817c66d4582d70cb740c13ac24ad8c26ac050ca68a2b4bf84aa5594977b30b37eaa4b60d361b3c7c0e4d35a77ab66cf12da67
                            SSDEEP:12288:VyrKywLz229e7sGJ3UogQpht8LFOcc6WkFR+wn3+0vCi/2mD0eIjAgC46H3Wsmij:VV29l19pv8bWkbr3nd2+sgT3c05s
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...q.._..............0......D......~.... ........@.. ....................................@................................

                            File Icon

                            Icon Hash:f8c492aaaa92dcfe

                            Static PE Info

                            General

                            Entrypoint:0x50e47e
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                            Time Stamp:0x5FB4A371 [Wed Nov 18 04:30:41 2020 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:v2.0.50727
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                            Entrypoint Preview

                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al

                            Data Directories

                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x10e4300x4b.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1100000x41a8.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1160000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                            Sections

                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x10c4840x10c600False0.694556539648data7.38603476189IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                            .rsrc0x1100000x41a80x4200False0.503551136364data5.45014806784IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x1160000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                            Resources

                            NameRVASizeTypeLanguageCountry
                            RT_ICON0x1101900x468GLS_BINARY_LSB_FIRST
                            RT_ICON0x1105f80x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4275388049, next used block 4258479509
                            RT_ICON0x1116a00x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 3771611807, next used block 3167566498
                            RT_GROUP_ICON0x113c480x30data
                            RT_VERSION0x113c780x344data
                            RT_MANIFEST0x113fbc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                            Imports

                            DLLImport
                            mscoree.dll_CorExeMain

                            Version Infos

                            DescriptionData
                            Translation0x0000 0x04b0
                            LegalCopyrightCopyright 2017
                            Assembly Version1.0.0.0
                            InternalNameu.exe
                            FileVersion1.0.0.0
                            CompanyName
                            LegalTrademarks
                            Comments
                            ProductNameClinic Management System
                            ProductVersion1.0.0.0
                            FileDescriptionClinic Management System
                            OriginalFilenameu.exe

                            Network Behavior

                            Network Port Distribution

                            TCP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            Nov 18, 2020 14:25:05.655561924 CET497074040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:05.762923956 CET40404970723.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:06.269063950 CET497074040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:06.376255989 CET40404970723.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:06.878592014 CET497074040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:06.985805988 CET40404970723.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:11.036412954 CET497114040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:11.143027067 CET40404971123.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:11.644598007 CET497114040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:11.751352072 CET40404971123.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:12.253920078 CET497114040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:12.360694885 CET40404971123.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:16.381172895 CET497124040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:16.487755060 CET40404971223.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:16.988778114 CET497124040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:17.095190048 CET40404971223.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:17.598263979 CET497124040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:17.704638004 CET40404971223.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:21.709471941 CET497134040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:21.816246033 CET40404971323.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:22.317313910 CET497134040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:22.424000978 CET40404971323.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:22.926789999 CET497134040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:23.033458948 CET40404971323.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:27.039275885 CET497144040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:27.145787954 CET40404971423.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:27.645889997 CET497144040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:27.752454042 CET40404971423.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:28.255383968 CET497144040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:28.363981962 CET40404971423.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:32.384649992 CET497154040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:32.491986036 CET40404971523.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:33.005712032 CET497154040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:33.113073111 CET40404971523.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:33.615221977 CET497154040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:33.722516060 CET40404971523.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:37.851440907 CET497164040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:37.958148003 CET40404971623.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:38.459316969 CET497164040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:38.566000938 CET40404971623.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:39.068857908 CET497164040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:39.175647020 CET40404971623.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:43.180646896 CET497184040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:43.284518003 CET40404971823.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:43.787796021 CET497184040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:43.891825914 CET40404971823.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:44.397327900 CET497184040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:44.501189947 CET40404971823.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:48.509617090 CET497194040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:48.612853050 CET40404971923.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:49.116368055 CET497194040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:49.219748020 CET40404971923.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:49.726284981 CET497194040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:49.829591990 CET40404971923.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:53.849896908 CET497204040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:53.956172943 CET40404972023.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:54.460562944 CET497204040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:54.567054987 CET40404972023.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:55.069973946 CET497204040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:55.176698923 CET40404972023.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:59.181191921 CET497214040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:59.284069061 CET40404972123.105.131.214192.168.2.7
                            Nov 18, 2020 14:25:59.789201975 CET497214040192.168.2.723.105.131.214
                            Nov 18, 2020 14:25:59.892447948 CET40404972123.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:00.398818970 CET497214040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:00.501836061 CET40404972123.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:04.605669975 CET497224040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:04.712171078 CET40404972223.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:05.227189064 CET497224040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:05.333668947 CET40404972223.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:05.836596012 CET497224040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:05.943167925 CET40404972223.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:09.948410034 CET497234040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:10.056273937 CET40404972323.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:10.571996927 CET497234040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:10.679358959 CET40404972323.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:11.196446896 CET497234040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:11.303950071 CET40404972323.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:15.307607889 CET497244040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:15.411216021 CET40404972423.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:15.915965080 CET497244040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:16.019602060 CET40404972423.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:16.525095940 CET497244040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:16.628814936 CET40404972423.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:20.667470932 CET497254040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:20.770468950 CET40404972523.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:21.275284052 CET497254040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:21.378113985 CET40404972523.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:21.884706020 CET497254040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:21.987725973 CET40404972523.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:25.997817993 CET497264040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:26.104825020 CET40404972623.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:26.619509935 CET497264040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:26.726696014 CET40404972623.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:27.228938103 CET497264040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:27.336147070 CET40404972623.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:31.341444969 CET497274040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:31.447765112 CET40404972723.105.131.214192.168.2.7
                            Nov 18, 2020 14:26:31.948226929 CET497274040192.168.2.723.105.131.214
                            Nov 18, 2020 14:26:32.054521084 CET40404972723.105.131.214192.168.2.7

                            Code Manipulations

                            Statistics

                            Behavior

                            Click to jump to process

                            System Behavior

                            General

                            Start time:14:24:57
                            Start date:18/11/2020
                            Path:C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe'
                            Imagebase:0x1a0000
                            File size:1117184 bytes
                            MD5 hash:444332A61D888AC4F80DB03B3C2129E9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.253897211.0000000003B42000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.253518250.000000000398D000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.253518250.000000000398D000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.253518250.000000000398D000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.251828506.0000000002994000.00000004.00000001.sdmp, Author: Joe Security
                            Reputation:low

                            General

                            Start time:14:25:01
                            Start date:18/11/2020
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ynSazlVxDpCRe' /XML 'C:\Users\user\AppData\Local\Temp\tmp10AA.tmp'
                            Imagebase:0xe50000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:14:25:02
                            Start date:18/11/2020
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff774ee0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:14:25:02
                            Start date:18/11/2020
                            Path:C:\Users\user\Desktop\NXKfWP9SPF0XHRu.exe
                            Wow64 process (32bit):true
                            Commandline:{path}
                            Imagebase:0x700000
                            File size:1117184 bytes
                            MD5 hash:444332A61D888AC4F80DB03B3C2129E9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.512257767.0000000005710000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.511185145.0000000003EE7000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.511185145.0000000003EE7000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.505689991.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.505689991.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.505689991.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.512006874.0000000005200000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.512006874.0000000005200000.00000004.00000001.sdmp, Author: Florian Roth
                            Reputation:low

                            Disassembly

                            Code Analysis

                            Reset < >