Loading ...

Play interactive tourEdit tour

Analysis Report WxTm2cWLHF

Overview

General Information

Sample Name:WxTm2cWLHF (renamed file extension from none to exe)
Analysis ID:356788
MD5:da6d54ef4dd6752367ff3f516196b292
SHA1:b88ea4e2bc892980e6e9a394a36cc262178bdbbd
SHA256:6f226cb3268aafbe3ff45d8dae3655c171ab7e6a0e2069815b761ffad9e3a7ea
Tags:NanoCore
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Binary contains a suspicious time stamp
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • WxTm2cWLHF.exe (PID: 5512 cmdline: 'C:\Users\user\Desktop\WxTm2cWLHF.exe' MD5: DA6D54EF4DD6752367FF3F516196B292)
    • schtasks.exe (PID: 6612 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eNEXCeqZvjFuTO' /XML 'C:\Users\user\AppData\Local\Temp\tmp30A3.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • WxTm2cWLHF.exe (PID: 6664 cmdline: {path} MD5: DA6D54EF4DD6752367FF3F516196B292)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "0875083a-8885-4a01-8069-09c5a276748c", "Group": "feb16", "Domain1": "amuokuku.duckdns.org", "Domain2": "alliedtrade54321.ddns.net", "Port": 32114, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "amuokuku.duckdns.org", "BackupDNSServer": "alliedtrade54321.ddns.net"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xf7ad:$x1: NanoCore.ClientPluginHost
  • 0xf7da:$x2: IClientNetworkHost
00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xf7ad:$x2: NanoCore.ClientPluginHost
  • 0x10888:$s4: PipeCreated
  • 0xf7c7:$s5: IClientLoggingHost
00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000007.00000002.497750745.0000000003F29000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000007.00000002.497750745.0000000003F29000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x2f15:$a: NanoCore
      • 0x2f6e:$a: NanoCore
      • 0x2fab:$a: NanoCore
      • 0x3024:$a: NanoCore
      • 0x166cf:$a: NanoCore
      • 0x166e4:$a: NanoCore
      • 0x16719:$a: NanoCore
      • 0x2f1c3:$a: NanoCore
      • 0x2f1d8:$a: NanoCore
      • 0x2f20d:$a: NanoCore
      • 0x2f77:$b: ClientPlugin
      • 0x2fb4:$b: ClientPlugin
      • 0x38b2:$b: ClientPlugin
      • 0x38bf:$b: ClientPlugin
      • 0x1648b:$b: ClientPlugin
      • 0x164a6:$b: ClientPlugin
      • 0x164d6:$b: ClientPlugin
      • 0x166ed:$b: ClientPlugin
      • 0x16722:$b: ClientPlugin
      • 0x2ef7f:$b: ClientPlugin
      • 0x2ef9a:$b: ClientPlugin
      Click to see the 18 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      0.2.WxTm2cWLHF.exe.43e16f0.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0.2.WxTm2cWLHF.exe.43e16f0.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      0.2.WxTm2cWLHF.exe.43e16f0.3.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        0.2.WxTm2cWLHF.exe.43e16f0.3.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfef5:$a: NanoCore
        • 0xff05:$a: NanoCore
        • 0x10139:$a: NanoCore
        • 0x1014d:$a: NanoCore
        • 0x1018d:$a: NanoCore
        • 0xff54:$b: ClientPlugin
        • 0x10156:$b: ClientPlugin
        • 0x10196:$b: ClientPlugin
        • 0x1007b:$c: ProjectData
        • 0x10a82:$d: DESCrypto
        • 0x1844e:$e: KeepAlive
        • 0x1643c:$g: LogClientMessage
        • 0x12637:$i: get_Connected
        • 0x10db8:$j: #=q
        • 0x10de8:$j: #=q
        • 0x10e04:$j: #=q
        • 0x10e34:$j: #=q
        • 0x10e50:$j: #=q
        • 0x10e6c:$j: #=q
        • 0x10e9c:$j: #=q
        • 0x10eb8:$j: #=q
        7.2.WxTm2cWLHF.exe.6154629.11.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xb184:$x1: NanoCore.ClientPluginHost
        • 0xb1b1:$x2: IClientNetworkHost
        Click to see the 33 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\WxTm2cWLHF.exe, ProcessId: 6664, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eNEXCeqZvjFuTO' /XML 'C:\Users\user\AppData\Local\Temp\tmp30A3.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eNEXCeqZvjFuTO' /XML 'C:\Users\user\AppData\Local\Temp\tmp30A3.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\WxTm2cWLHF.exe' , ParentImage: C:\Users\user\Desktop\WxTm2cWLHF.exe, ParentProcessId: 5512, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eNEXCeqZvjFuTO' /XML 'C:\Users\user\AppData\Local\Temp\tmp30A3.tmp', ProcessId: 6612

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000007.00000002.497750745.0000000003F29000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "0875083a-8885-4a01-8069-09c5a276748c", "Group": "feb16", "Domain1": "amuokuku.duckdns.org", "Domain2": "alliedtrade54321.ddns.net", "Port": 32114, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "amuokuku.duckdns.org", "BackupDNSServer": "alliedtrade54321.ddns.net"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\eNEXCeqZvjFuTO.exeMetadefender: Detection: 27%Perma Link
        Source: C:\Users\user\AppData\Roaming\eNEXCeqZvjFuTO.exeReversingLabs: Detection: 60%
        Multi AV Scanner detection for submitted fileShow sources
        Source: WxTm2cWLHF.exeVirustotal: Detection: 49%Perma Link
        Source: WxTm2cWLHF.exeMetadefender: Detection: 27%Perma Link
        Source: WxTm2cWLHF.exeReversingLabs: Detection: 60%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.497750745.0000000003F29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.491562642.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.494580677.0000000002EE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.279715040.0000000003EB9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.281914406.00000000043AE000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: WxTm2cWLHF.exe PID: 6664, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: WxTm2cWLHF.exe PID: 5512, type: MEMORY
        Source: Yara matchFile source: 0.2.WxTm2cWLHF.exe.43e16f0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.6154629.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f34595.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f2ff6c.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f2ff6c.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.WxTm2cWLHF.exe.43e16f0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.6150000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f2b136.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.6150000.10.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\eNEXCeqZvjFuTO.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: WxTm2cWLHF.exeJoe Sandbox ML: detected
        Source: 7.2.WxTm2cWLHF.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.2.WxTm2cWLHF.exe.6150000.10.unpackAvira: Label: TR/NanoCore.fadte

        Compliance:

        barindex
        Uses 32bit PE filesShow sources
        Source: WxTm2cWLHF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
        Source: WxTm2cWLHF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: amuokuku.duckdns.org
        Source: Malware configuration extractorURLs: alliedtrade54321.ddns.net
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: amuokuku.duckdns.org
        Source: unknownDNS query: name: alliedtrade54321.ddns.net
        Source: global trafficTCP traffic: 192.168.2.5:49718 -> 79.134.225.71:32114
        Source: global trafficTCP traffic: 192.168.2.5:49723 -> 105.112.97.157:32114
        Source: Joe Sandbox ViewIP Address: 79.134.225.71 79.134.225.71
        Source: Joe Sandbox ViewASN Name: VNL1-ASNG VNL1-ASNG
        Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
        Source: unknownDNS traffic detected: queries for: amuokuku.duckdns.org
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: WxTm2cWLHF.exe, 00000000.00000002.279546261.0000000002EB1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: WxTm2cWLHF.exe, 00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.497750745.0000000003F29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.491562642.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.494580677.0000000002EE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.279715040.0000000003EB9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.281914406.00000000043AE000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: WxTm2cWLHF.exe PID: 6664, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: WxTm2cWLHF.exe PID: 5512, type: MEMORY
        Source: Yara matchFile source: 0.2.WxTm2cWLHF.exe.43e16f0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.6154629.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f34595.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f2ff6c.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f2ff6c.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.WxTm2cWLHF.exe.43e16f0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.6150000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f2b136.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.6150000.10.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.497750745.0000000003F29000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.491562642.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.491562642.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.279715040.0000000003EB9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.279715040.0000000003EB9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.281914406.00000000043AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.281914406.00000000043AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.498775362.00000000055D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: WxTm2cWLHF.exe PID: 6664, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: WxTm2cWLHF.exe PID: 6664, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: WxTm2cWLHF.exe PID: 5512, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: WxTm2cWLHF.exe PID: 5512, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.WxTm2cWLHF.exe.43e16f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.WxTm2cWLHF.exe.43e16f0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.WxTm2cWLHF.exe.6154629.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.WxTm2cWLHF.exe.3f34595.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.WxTm2cWLHF.exe.2f0c9f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.WxTm2cWLHF.exe.55d0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.WxTm2cWLHF.exe.3f2ff6c.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.WxTm2cWLHF.exe.3f2ff6c.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.WxTm2cWLHF.exe.43e16f0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.WxTm2cWLHF.exe.43e16f0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.WxTm2cWLHF.exe.6150000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.WxTm2cWLHF.exe.3f2b136.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.WxTm2cWLHF.exe.3f2b136.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.WxTm2cWLHF.exe.6150000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeCode function: 0_2_013AC154
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeCode function: 0_2_013AE598
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeCode function: 0_2_013AE589
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeCode function: 0_2_09AE153A
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeCode function: 7_2_0152E471
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeCode function: 7_2_0152E480
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeCode function: 7_2_0152BBD4
        Source: WxTm2cWLHF.exeBinary or memory string: OriginalFilename vs WxTm2cWLHF.exe
        Source: WxTm2cWLHF.exe, 00000000.00000002.287647872.00000000078C0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs WxTm2cWLHF.exe
        Source: WxTm2cWLHF.exe, 00000000.00000002.287647872.00000000078C0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs WxTm2cWLHF.exe
        Source: WxTm2cWLHF.exe, 00000000.00000002.289732815.0000000009750000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs WxTm2cWLHF.exe
        Source: WxTm2cWLHF.exeBinary or memory string: OriginalFilename vs WxTm2cWLHF.exe
        Source: WxTm2cWLHF.exe, 00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs WxTm2cWLHF.exe
        Source: WxTm2cWLHF.exe, 00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs WxTm2cWLHF.exe
        Source: WxTm2cWLHF.exe, 00000007.00000002.497750745.0000000003F29000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs WxTm2cWLHF.exe
        Source: WxTm2cWLHF.exe, 00000007.00000002.499691551.0000000006ED0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs WxTm2cWLHF.exe
        Source: WxTm2cWLHF.exe, 00000007.00000002.499066058.0000000006060000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs WxTm2cWLHF.exe
        Source: WxTm2cWLHF.exeBinary or memory string: OriginalFilename vs WxTm2cWLHF.exe
        Source: WxTm2cWLHF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000007.00000002.497750745.0000000003F29000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.491562642.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.491562642.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.279715040.0000000003EB9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.279715040.0000000003EB9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.281914406.00000000043AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.281914406.00000000043AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.498775362.00000000055D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.498775362.00000000055D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: Process Memory Space: WxTm2cWLHF.exe PID: 6664, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: WxTm2cWLHF.exe PID: 6664, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: WxTm2cWLHF.exe PID: 5512, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: WxTm2cWLHF.exe PID: 5512, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.WxTm2cWLHF.exe.43e16f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.WxTm2cWLHF.exe.43e16f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.WxTm2cWLHF.exe.43e16f0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.WxTm2cWLHF.exe.6154629.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.WxTm2cWLHF.exe.6154629.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.WxTm2cWLHF.exe.3f34595.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.WxTm2cWLHF.exe.3f34595.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.WxTm2cWLHF.exe.2f0c9f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.WxTm2cWLHF.exe.2f0c9f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.WxTm2cWLHF.exe.55d0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.WxTm2cWLHF.exe.55d0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.WxTm2cWLHF.exe.3f2ff6c.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.WxTm2cWLHF.exe.3f2ff6c.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.WxTm2cWLHF.exe.3f2ff6c.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.WxTm2cWLHF.exe.3f2ff6c.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.WxTm2cWLHF.exe.43e16f0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.WxTm2cWLHF.exe.43e16f0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.WxTm2cWLHF.exe.43e16f0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.WxTm2cWLHF.exe.6150000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.WxTm2cWLHF.exe.6150000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.WxTm2cWLHF.exe.3f2b136.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.WxTm2cWLHF.exe.3f2b136.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.WxTm2cWLHF.exe.3f2b136.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.WxTm2cWLHF.exe.6150000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.WxTm2cWLHF.exe.6150000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: WxTm2cWLHF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: eNEXCeqZvjFuTO.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@6/4@10/3
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeFile created: C:\Users\user\AppData\Roaming\eNEXCeqZvjFuTO.exeJump to behavior
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeMutant created: \Sessions\1\BaseNamedObjects\gErHUAiRFLKblIUfeLFvYmo
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6620:120:WilError_01
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{0875083a-8885-4a01-8069-09c5a276748c}
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeFile created: C:\Users\user\AppData\Local\Temp\tmp30A3.tmpJump to behavior
        Source: WxTm2cWLHF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: WxTm2cWLHF.exeVirustotal: Detection: 49%
        Source: WxTm2cWLHF.exeMetadefender: Detection: 27%
        Source: WxTm2cWLHF.exeReversingLabs: Detection: 60%
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeFile read: C:\Users\user\Desktop\WxTm2cWLHF.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\WxTm2cWLHF.exe 'C:\Users\user\Desktop\WxTm2cWLHF.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eNEXCeqZvjFuTO' /XML 'C:\Users\user\AppData\Local\Temp\tmp30A3.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\WxTm2cWLHF.exe {path}
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eNEXCeqZvjFuTO' /XML 'C:\Users\user\AppData\Local\Temp\tmp30A3.tmp'
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess created: C:\Users\user\Desktop\WxTm2cWLHF.exe {path}
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: WxTm2cWLHF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: WxTm2cWLHF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: WxTm2cWLHF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Binary contains a suspicious time stampShow sources
        Source: initial sampleStatic PE information: 0xA6400EE4 [Tue May 21 14:12:52 2058 UTC]
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeCode function: 0_2_09AE6847 push FFFFFF8Bh; iretd
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeCode function: 0_2_09AE6740 push dword ptr [ebx+ebp-75h]; iretd
        Source: initial sampleStatic PE information: section name: .text entropy: 7.91955251095
        Source: initial sampleStatic PE information: section name: .text entropy: 7.91955251095
        Source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeFile created: C:\Users\user\AppData\Roaming\eNEXCeqZvjFuTO.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eNEXCeqZvjFuTO' /XML 'C:\Users\user\AppData\Local\Temp\tmp30A3.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeFile opened: C:\Users\user\Desktop\WxTm2cWLHF.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeWindow / User API: threadDelayed 4671
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeWindow / User API: threadDelayed 4763
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeWindow / User API: foregroundWindowGot 818
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exe TID: 5476Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exe TID: 6876Thread sleep time: -13835058055282155s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: WxTm2cWLHF.exe, 00000007.00000002.493813156.0000000001349000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllU
        Source: WxTm2cWLHF.exe, 00000007.00000002.499691551.0000000006ED0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: WxTm2cWLHF.exe, 00000007.00000002.499691551.0000000006ED0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: WxTm2cWLHF.exe, 00000007.00000002.499691551.0000000006ED0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: WxTm2cWLHF.exe, 00000007.00000002.499691551.0000000006ED0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeMemory written: C:\Users\user\Desktop\WxTm2cWLHF.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eNEXCeqZvjFuTO' /XML 'C:\Users\user\AppData\Local\Temp\tmp30A3.tmp'
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeProcess created: C:\Users\user\Desktop\WxTm2cWLHF.exe {path}
        Source: WxTm2cWLHF.exe, 00000007.00000002.494805703.0000000002FDD000.00000004.00000001.sdmpBinary or memory string: Program Managerh
        Source: WxTm2cWLHF.exe, 00000007.00000002.497614468.000000000340C000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: WxTm2cWLHF.exe, 00000007.00000002.494276869.0000000001970000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: WxTm2cWLHF.exe, 00000007.00000002.494276869.0000000001970000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: WxTm2cWLHF.exe, 00000007.00000002.494276869.0000000001970000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
        Source: WxTm2cWLHF.exe, 00000007.00000002.497614468.000000000340C000.00000004.00000001.sdmpBinary or memory string: Program Manager|$[
        Source: WxTm2cWLHF.exe, 00000007.00000002.494276869.0000000001970000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
        Source: WxTm2cWLHF.exe, 00000007.00000002.494276869.0000000001970000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: WxTm2cWLHF.exe, 00000007.00000002.499305855.00000000062BD000.00000004.00000001.sdmpBinary or memory string: Program ManagerXU!
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Users\user\Desktop\WxTm2cWLHF.exe VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Users\user\Desktop\WxTm2cWLHF.exe VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\WxTm2cWLHF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.497750745.0000000003F29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.491562642.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.494580677.0000000002EE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.279715040.0000000003EB9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.281914406.00000000043AE000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: WxTm2cWLHF.exe PID: 6664, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: WxTm2cWLHF.exe PID: 5512, type: MEMORY
        Source: Yara matchFile source: 0.2.WxTm2cWLHF.exe.43e16f0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.6154629.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f34595.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f2ff6c.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f2ff6c.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.WxTm2cWLHF.exe.43e16f0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.6150000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f2b136.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.6150000.10.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: WxTm2cWLHF.exe, 00000000.00000002.281914406.00000000043AE000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: WxTm2cWLHF.exe, 00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: WxTm2cWLHF.exe, 00000007.00000002.497750745.0000000003F29000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.497750745.0000000003F29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.491562642.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.494580677.0000000002EE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.279715040.0000000003EB9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.281914406.00000000043AE000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: WxTm2cWLHF.exe PID: 6664, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: WxTm2cWLHF.exe PID: 5512, type: MEMORY
        Source: Yara matchFile source: 0.2.WxTm2cWLHF.exe.43e16f0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.6154629.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f34595.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f2ff6c.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f2ff6c.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.WxTm2cWLHF.exe.43e16f0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.6150000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.3f2b136.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.WxTm2cWLHF.exe.6150000.10.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection112Masquerading1Input Capture11Security Software Discovery111Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion3LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Timestomp1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        WxTm2cWLHF.exe49%VirustotalBrowse
        WxTm2cWLHF.exe30%MetadefenderBrowse
        WxTm2cWLHF.exe60%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        WxTm2cWLHF.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\eNEXCeqZvjFuTO.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\eNEXCeqZvjFuTO.exe30%MetadefenderBrowse
        C:\Users\user\AppData\Roaming\eNEXCeqZvjFuTO.exe60%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        7.2.WxTm2cWLHF.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.2.WxTm2cWLHF.exe.6150000.10.unpack100%AviraTR/NanoCore.fadteDownload File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        amuokuku.duckdns.org0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        alliedtrade54321.ddns.net0%Avira URL Cloudsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        alliedtrade54321.ddns.net
        105.112.97.157
        truetrue
          unknown
          amuokuku.duckdns.org
          79.134.225.71
          truetrue
            unknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            amuokuku.duckdns.orgtrue
            • Avira URL Cloud: safe
            unknown
            alliedtrade54321.ddns.nettrue
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.apache.org/licenses/LICENSE-2.0WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
              high
              http://www.fontbureau.comWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designersGWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                  high
                  http://www.fontbureau.com/designers/?WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bTheWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                      high
                      http://www.tiro.comWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                        high
                        http://www.goodfont.co.krWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comlWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cTheWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8WxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                              high
                              http://www.fonts.comWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                                high
                                http://www.sandoll.co.krWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deDPleaseWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameWxTm2cWLHF.exe, 00000000.00000002.279546261.0000000002EB1000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.sakkal.comWxTm2cWLHF.exe, 00000000.00000002.286567113.0000000007012000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown

                                  Contacted IPs

                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs

                                  Public

                                  IPDomainCountryFlagASNASN NameMalicious
                                  105.112.97.157
                                  unknownNigeria
                                  36873VNL1-ASNGtrue
                                  79.134.225.71
                                  unknownSwitzerland
                                  6775FINK-TELECOM-SERVICESCHtrue

                                  Private

                                  IP
                                  192.168.2.1

                                  General Information

                                  Joe Sandbox Version:31.0.0 Emerald
                                  Analysis ID:356788
                                  Start date:23.02.2021
                                  Start time:16:40:00
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 8m 28s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:WxTm2cWLHF (renamed file extension from none to exe)
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:23
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@6/4@10/3
                                  EGA Information:Failed
                                  HDC Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  Warnings:
                                  Show All
                                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 51.103.5.186, 168.61.161.212, 131.253.33.200, 13.107.22.200, 51.104.144.132, 104.43.193.48, 23.211.6.115, 13.64.90.137, 13.88.21.125, 184.30.20.56, 51.104.139.180, 92.122.213.194, 92.122.213.247, 20.54.26.129
                                  • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, www.bing.com, client.wns.windows.com, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, skypedataprdcolcus15.cloudapp.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, vip2-par02p.wns.notify.trafficmanager.net
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.

                                  Simulations

                                  Behavior and APIs

                                  TimeTypeDescription
                                  16:40:57API Interceptor856x Sleep call for process: WxTm2cWLHF.exe modified

                                  Joe Sandbox View / Context

                                  IPs

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  79.134.225.71uHAHxir7cFIdUqL.exeGet hashmaliciousBrowse
                                    Wrcpl1dkib.exeGet hashmaliciousBrowse
                                      PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                        PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                          Swift-EUR 28700.exeGet hashmaliciousBrowse
                                            PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                              PAYMENT NOTIFICATION.exeGet hashmaliciousBrowse
                                                PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                                  PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                                    PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                                      PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                                        fakture.exeGet hashmaliciousBrowse
                                                          BACK ORDER EXPORT0026254E_DOC_PDF.exeGet hashmaliciousBrowse
                                                            img_Payment Advice_822020_jpg.exeGet hashmaliciousBrowse
                                                              Bank Swift_7312020_PDF.exeGet hashmaliciousBrowse
                                                                LKVQYCZZkBgadMX.exeGet hashmaliciousBrowse
                                                                  aXfA69gLbsTjxGu.exeGet hashmaliciousBrowse
                                                                    22021Item_list_sheet#7292020_PDF.exeGet hashmaliciousBrowse
                                                                      0RY9t35YcXOZNbf.exeGet hashmaliciousBrowse
                                                                        Shipping Document COMM. INV. AFI0147660.jsGet hashmaliciousBrowse

                                                                          Domains

                                                                          No context

                                                                          ASN

                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                          FINK-TELECOM-SERVICESCHPayment Confirmation.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.30
                                                                          rjHlt1zz28.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.49
                                                                          Deadly Variants of Covid 19.docGet hashmaliciousBrowse
                                                                          • 79.134.225.49
                                                                          document.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.122
                                                                          5293ea9467ea45e928620a5ed74440f5.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.105
                                                                          f1a14e6352036833f1c109e1bb2934f2.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.105
                                                                          256ec8f8f67b59c5e085b0bb63afcd13.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.105
                                                                          JOIN.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.30
                                                                          Delivery pdf.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.25
                                                                          d88e07467ddcf9e3b19fa972b9f000d1.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.105
                                                                          fnfqzfwC44.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.25
                                                                          Solicitud de oferta 6100003768.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.96
                                                                          Nrfgylra.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.96
                                                                          HTQ19-P0401-Q0539 NE-Q22940 GR2P5 TYPBLDG-NASER AL FERDAN.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.62
                                                                          HTQ19-P0401-Q0539 NE-Q22940 GR2P5 TYPBLDG-NASER AL FERDAN.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.62
                                                                          HTQ19-P0401-Q0539 NE-Q22940 GR2P5 TYPBLDG-NASER AL FERDAN.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.62
                                                                          Form pdf.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.25
                                                                          Quotation 3342688.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.120
                                                                          REQUEST FOR QUOTATION.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.76
                                                                          Orden.exeGet hashmaliciousBrowse
                                                                          • 79.134.225.6
                                                                          VNL1-ASNGCN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                                                                          • 105.112.108.188
                                                                          OXplew3YfS.exeGet hashmaliciousBrowse
                                                                          • 105.112.39.144
                                                                          Y8HGtWidPK.exeGet hashmaliciousBrowse
                                                                          • 105.112.145.251
                                                                          CN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                                                                          • 105.112.106.235
                                                                          8Z4Pwqk8E2.exeGet hashmaliciousBrowse
                                                                          • 105.112.50.235
                                                                          Specification lista.docGet hashmaliciousBrowse
                                                                          • 105.112.50.235
                                                                          Protected.exeGet hashmaliciousBrowse
                                                                          • 105.112.108.92
                                                                          Protected.2.exeGet hashmaliciousBrowse
                                                                          • 105.112.101.243
                                                                          CN-Invoice-XXXXX9808-19011143287989 (2).exeGet hashmaliciousBrowse
                                                                          • 105.112.109.252
                                                                          SWIFT_DCREF98302893884939475988EURO9284798783648877374875787839.pdf.exeGet hashmaliciousBrowse
                                                                          • 105.112.145.61
                                                                          RFQ_Report_19757_pdf____.exeGet hashmaliciousBrowse
                                                                          • 105.112.37.158
                                                                          RFQ_Report_197_pdf____.exeGet hashmaliciousBrowse
                                                                          • 105.112.39.136
                                                                          DOC 20210121__00101094001001001.exeGet hashmaliciousBrowse
                                                                          • 105.112.101.11
                                                                          Purchase order LM20210120991001.exeGet hashmaliciousBrowse
                                                                          • 105.112.97.27
                                                                          company profile.exeGet hashmaliciousBrowse
                                                                          • 105.112.102.172
                                                                          Order_List_PO# 081929.exeGet hashmaliciousBrowse
                                                                          • 105.112.102.160
                                                                          Doc#6620200947535257653.exeGet hashmaliciousBrowse
                                                                          • 105.112.102.162
                                                                          Doc#6620200947535257653.exeGet hashmaliciousBrowse
                                                                          • 105.112.106.128
                                                                          DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                                                          • 105.112.113.90
                                                                          DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                                                          • 105.112.113.90

                                                                          JA3 Fingerprints

                                                                          No context

                                                                          Dropped Files

                                                                          No context

                                                                          Created / dropped Files

                                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WxTm2cWLHF.exe.log
                                                                          Process:C:\Users\user\Desktop\WxTm2cWLHF.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):1216
                                                                          Entropy (8bit):5.355304211458859
                                                                          Encrypted:false
                                                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                          MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                          Malicious:true
                                                                          Reputation:high, very likely benign file
                                                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                          C:\Users\user\AppData\Local\Temp\tmp30A3.tmp
                                                                          Process:C:\Users\user\Desktop\WxTm2cWLHF.exe
                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):1651
                                                                          Entropy (8bit):5.186199962114581
                                                                          Encrypted:false
                                                                          SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKButn:cbhC7ZlNQF/rydbz9I3YODOLNdq3S
                                                                          MD5:78CF241614E152967085A98389274917
                                                                          SHA1:6D5F00D9AC3EA0E74DC7263BD591FA6C88F0CB45
                                                                          SHA-256:3FE6A17A16D3E41444BF023F53EBBEFF93E093AF60C0F6ED7E290E5E5E9D8B8E
                                                                          SHA-512:3C452CCE63221A6F75BEDEE116DB8DE48A234F0258D90203A077FC47C44E7FB11534CBCEB732624D80CC938D2A582D2ACCFC99EFE190FD25D54E1326AF35C1FE
                                                                          Malicious:true
                                                                          Reputation:low
                                                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                          Process:C:\Users\user\Desktop\WxTm2cWLHF.exe
                                                                          File Type:ISO-8859 text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):8
                                                                          Entropy (8bit):2.75
                                                                          Encrypted:false
                                                                          SSDEEP:3:iAjPn:iMPn
                                                                          MD5:66BE891445F5A78B0583526FF59F4E0D
                                                                          SHA1:85C561F403766238C5AADD91FB118AB876100FFD
                                                                          SHA-256:371859A54D364B21155F0A3258D151DE8BE5CA14E6585D87ADC9D6B7D5315D20
                                                                          SHA-512:F807334D17FAD0E5B2572C7D44FB11A619F63919BF1D8872A6B67E112B9C31A35541A1C5DB45F82A000AF1239DD32947586C453502CFC941221359D0C1D0A8F6
                                                                          Malicious:true
                                                                          Reputation:low
                                                                          Preview: .v..\..H
                                                                          C:\Users\user\AppData\Roaming\eNEXCeqZvjFuTO.exe
                                                                          Process:C:\Users\user\Desktop\WxTm2cWLHF.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):761344
                                                                          Entropy (8bit):7.913371093347372
                                                                          Encrypted:false
                                                                          SSDEEP:12288:hDk0V4mojYDSq0+YWjUW0wQ4g9X/h+ZKAPX9DOr+LLrPBCs+cYv2tasGHW:hIdj9qtYWQWV3g9P4wmOr2tCssutasoW
                                                                          MD5:DA6D54EF4DD6752367FF3F516196B292
                                                                          SHA1:B88EA4E2BC892980E6E9A394A36CC262178BDBBD
                                                                          SHA-256:6F226CB3268AAFBE3FF45D8DAE3655C171AB7E6A0E2069815B761FFAD9E3A7EA
                                                                          SHA-512:2B7DFBFDAD286593327FC0A88F8DD6A4AEA478326F0452D78987C223C587A86AB934DF94E59EB2466AA9049EE35268C4587BF719840217185FE2123551A1B06A
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          • Antivirus: Metadefender, Detection: 30%, Browse
                                                                          • Antivirus: ReversingLabs, Detection: 60%
                                                                          Reputation:low
                                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....@...............0.............2.... ........@.. ....................................@....................................O................................................................................... ............... ..H............text...8.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H..........0`......X.... ...............................................0............}.....(................,...+..%.....,...+.............,...+..%.....,...+....(...............,...+..%.....,...+.............,...+..%.....,...+....r...p.(....(....o......{.....(....o......{....r...p.(....(....o......{.....(....o......{.....(....o......{.....(....o.....*...0........... ...... ..........,. .....+.. ............,...X.+.............,...+..%.....,...+.............,...+..%.....,...

                                                                          Static File Info

                                                                          General

                                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Entropy (8bit):7.913371093347372
                                                                          TrID:
                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                          • DOS Executable Generic (2002/1) 0.01%
                                                                          File name:WxTm2cWLHF.exe
                                                                          File size:761344
                                                                          MD5:da6d54ef4dd6752367ff3f516196b292
                                                                          SHA1:b88ea4e2bc892980e6e9a394a36cc262178bdbbd
                                                                          SHA256:6f226cb3268aafbe3ff45d8dae3655c171ab7e6a0e2069815b761ffad9e3a7ea
                                                                          SHA512:2b7dfbfdad286593327fc0a88f8dd6a4aea478326f0452d78987c223c587a86ab934df94e59eb2466aa9049ee35268c4587bf719840217185fe2123551a1b06a
                                                                          SSDEEP:12288:hDk0V4mojYDSq0+YWjUW0wQ4g9X/h+ZKAPX9DOr+LLrPBCs+cYv2tasGHW:hIdj9qtYWQWV3g9P4wmOr2tCssutasoW
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....@...............0.............2.... ........@.. ....................................@................................

                                                                          File Icon

                                                                          Icon Hash:00828e8e8686b000

                                                                          Static PE Info

                                                                          General

                                                                          Entrypoint:0x4bb232
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                          Time Stamp:0xA6400EE4 [Tue May 21 14:12:52 2058 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:v4.0.30319
                                                                          OS Version Major:4
                                                                          OS Version Minor:0
                                                                          File Version Major:4
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:4
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                          Entrypoint Preview

                                                                          Instruction
                                                                          jmp dword ptr [00402000h]
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al

                                                                          Data Directories

                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xbb1e00x4f.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xbc0000x5d8.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xbe0000xc.reloc
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0xbb1c40x1c.text
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                          Sections

                                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x20000xb92380xb9400False0.933784845226data7.91955251095IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                          .rsrc0xbc0000x5d80x600False0.443359375data4.25019891341IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .reloc0xbe0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                          Resources

                                                                          NameRVASizeTypeLanguageCountry
                                                                          RT_VERSION0xbc0900x348data
                                                                          RT_MANIFEST0xbc3e80x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                          Imports

                                                                          DLLImport
                                                                          mscoree.dll_CorExeMain

                                                                          Version Infos

                                                                          DescriptionData
                                                                          Translation0x0000 0x04b0
                                                                          LegalCopyrightCopyright 2020
                                                                          Assembly Version4.0.0.0
                                                                          InternalName2ygj.exe
                                                                          FileVersion4.0.0.0
                                                                          CompanyName
                                                                          LegalTrademarks
                                                                          CommentsNeurology Ward
                                                                          ProductNameWard Manage
                                                                          ProductVersion4.0.0.0
                                                                          FileDescriptionWard Manage
                                                                          OriginalFilename2ygj.exe

                                                                          Network Behavior

                                                                          Network Port Distribution

                                                                          TCP Packets

                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Feb 23, 2021 16:41:19.342808962 CET4971832114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:41:19.425188065 CET321144971879.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:41:20.108927965 CET4971832114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:41:20.194417953 CET321144971879.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:41:20.811820984 CET4971832114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:41:20.896488905 CET321144971879.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:41:25.697400093 CET4972132114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:41:25.782759905 CET321144972179.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:41:26.312552929 CET4972132114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:41:26.397927999 CET321144972179.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:41:27.015450001 CET4972132114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:41:27.100970984 CET321144972179.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:41:31.389858961 CET4972232114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:41:31.475544930 CET321144972279.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:41:32.015906096 CET4972232114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:41:32.106271029 CET321144972279.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:41:32.703418970 CET4972232114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:41:32.788821936 CET321144972279.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:41:36.901573896 CET4972332114192.168.2.5105.112.97.157
                                                                          Feb 23, 2021 16:41:39.907102108 CET4972332114192.168.2.5105.112.97.157
                                                                          Feb 23, 2021 16:41:45.907639980 CET4972332114192.168.2.5105.112.97.157
                                                                          Feb 23, 2021 16:41:53.570995092 CET4973232114192.168.2.5105.112.97.157
                                                                          Feb 23, 2021 16:41:56.580395937 CET4973232114192.168.2.5105.112.97.157
                                                                          Feb 23, 2021 16:42:02.597054958 CET4973232114192.168.2.5105.112.97.157
                                                                          Feb 23, 2021 16:42:10.246635914 CET4973432114192.168.2.5105.112.97.157
                                                                          Feb 23, 2021 16:42:13.253674984 CET4973432114192.168.2.5105.112.97.157
                                                                          Feb 23, 2021 16:42:19.254192114 CET4973432114192.168.2.5105.112.97.157
                                                                          Feb 23, 2021 16:42:28.394542933 CET4973532114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:42:28.479233027 CET321144973579.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:42:28.989315987 CET4973532114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:42:29.072365999 CET321144973579.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:42:29.583412886 CET4973532114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:42:29.667824030 CET321144973579.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:42:34.024620056 CET4973632114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:42:34.112453938 CET321144973679.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:42:34.614995956 CET4973632114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:42:34.702390909 CET321144973679.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:42:35.208592892 CET4973632114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:42:35.294507980 CET321144973679.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:42:39.586431980 CET4973732114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:42:39.669121981 CET321144973779.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:42:40.177938938 CET4973732114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:42:40.264960051 CET321144973779.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:42:40.771559954 CET4973732114192.168.2.579.134.225.71
                                                                          Feb 23, 2021 16:42:40.856256008 CET321144973779.134.225.71192.168.2.5
                                                                          Feb 23, 2021 16:42:45.055721045 CET4973832114192.168.2.5105.112.97.157
                                                                          Feb 23, 2021 16:42:48.069046974 CET4973832114192.168.2.5105.112.97.157
                                                                          Feb 23, 2021 16:42:54.069581985 CET4973832114192.168.2.5105.112.97.157

                                                                          UDP Packets

                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Feb 23, 2021 16:40:42.037596941 CET5430253192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:42.089063883 CET53543028.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:40:42.124280930 CET5378453192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:42.183512926 CET53537848.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:40:42.640094995 CET6530753192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:42.681694031 CET6434453192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:42.693265915 CET53653078.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:40:42.732157946 CET53643448.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:40:43.767921925 CET6206053192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:43.816921949 CET53620608.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:40:44.745151997 CET6180553192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:44.795537949 CET53618058.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:40:45.042634010 CET5479553192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:45.101361036 CET53547958.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:40:45.734138012 CET4955753192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:45.782907009 CET53495578.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:40:46.938448906 CET6173353192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:46.987149954 CET53617338.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:40:52.688620090 CET6544753192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:52.740266085 CET53654478.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:40:53.715102911 CET5244153192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:53.763701916 CET53524418.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:40:54.892847061 CET6217653192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:54.942040920 CET53621768.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:40:55.900330067 CET5959653192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:55.951833963 CET53595968.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:40:56.931376934 CET6529653192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:56.982983112 CET53652968.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:40:58.312891006 CET6318353192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:58.361665010 CET53631838.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:40:59.471916914 CET6015153192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:40:59.523488998 CET53601518.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:41:10.593978882 CET5696953192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:41:10.665903091 CET53569698.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:41:19.099385977 CET5516153192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:41:19.323225975 CET53551618.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:41:21.875500917 CET5475753192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:41:21.927145004 CET53547578.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:41:25.476241112 CET4999253192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:41:25.695888042 CET53499928.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:41:31.163094997 CET6007553192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:41:31.383889914 CET53600758.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:41:36.837410927 CET5501653192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:41:36.900299072 CET53550168.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:41:38.061328888 CET6434553192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:41:38.113519907 CET53643458.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:41:40.435273886 CET5712853192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:41:40.483845949 CET53571288.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:41:47.697206974 CET5479153192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:41:47.758457899 CET53547918.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:41:53.506145000 CET5046353192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:41:53.566163063 CET53504638.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:42:00.694535971 CET5039453192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:42:00.767443895 CET53503948.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:42:10.186449051 CET5853053192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:42:10.245104074 CET53585308.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:42:28.335293055 CET5381353192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:42:28.392420053 CET53538138.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:42:33.801003933 CET6373253192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:42:34.021429062 CET53637328.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:42:39.336334944 CET5734453192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:42:39.557692051 CET53573448.8.8.8192.168.2.5
                                                                          Feb 23, 2021 16:42:44.989430904 CET5445053192.168.2.58.8.8.8
                                                                          Feb 23, 2021 16:42:45.051445007 CET53544508.8.8.8192.168.2.5

                                                                          DNS Queries

                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                          Feb 23, 2021 16:41:19.099385977 CET192.168.2.58.8.8.80xe570Standard query (0)amuokuku.duckdns.orgA (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:41:25.476241112 CET192.168.2.58.8.8.80x2e93Standard query (0)amuokuku.duckdns.orgA (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:41:31.163094997 CET192.168.2.58.8.8.80xb18fStandard query (0)amuokuku.duckdns.orgA (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:41:36.837410927 CET192.168.2.58.8.8.80x31a3Standard query (0)alliedtrade54321.ddns.netA (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:41:53.506145000 CET192.168.2.58.8.8.80x4b08Standard query (0)alliedtrade54321.ddns.netA (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:42:10.186449051 CET192.168.2.58.8.8.80x7779Standard query (0)alliedtrade54321.ddns.netA (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:42:28.335293055 CET192.168.2.58.8.8.80xc5f4Standard query (0)amuokuku.duckdns.orgA (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:42:33.801003933 CET192.168.2.58.8.8.80x7dd4Standard query (0)amuokuku.duckdns.orgA (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:42:39.336334944 CET192.168.2.58.8.8.80x997bStandard query (0)amuokuku.duckdns.orgA (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:42:44.989430904 CET192.168.2.58.8.8.80x9c30Standard query (0)alliedtrade54321.ddns.netA (IP address)IN (0x0001)

                                                                          DNS Answers

                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                          Feb 23, 2021 16:41:19.323225975 CET8.8.8.8192.168.2.50xe570No error (0)amuokuku.duckdns.org79.134.225.71A (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:41:25.695888042 CET8.8.8.8192.168.2.50x2e93No error (0)amuokuku.duckdns.org79.134.225.71A (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:41:31.383889914 CET8.8.8.8192.168.2.50xb18fNo error (0)amuokuku.duckdns.org79.134.225.71A (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:41:36.900299072 CET8.8.8.8192.168.2.50x31a3No error (0)alliedtrade54321.ddns.net105.112.97.157A (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:41:53.566163063 CET8.8.8.8192.168.2.50x4b08No error (0)alliedtrade54321.ddns.net105.112.97.157A (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:42:10.245104074 CET8.8.8.8192.168.2.50x7779No error (0)alliedtrade54321.ddns.net105.112.97.157A (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:42:28.392420053 CET8.8.8.8192.168.2.50xc5f4No error (0)amuokuku.duckdns.org79.134.225.71A (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:42:34.021429062 CET8.8.8.8192.168.2.50x7dd4No error (0)amuokuku.duckdns.org79.134.225.71A (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:42:39.557692051 CET8.8.8.8192.168.2.50x997bNo error (0)amuokuku.duckdns.org79.134.225.71A (IP address)IN (0x0001)
                                                                          Feb 23, 2021 16:42:45.051445007 CET8.8.8.8192.168.2.50x9c30No error (0)alliedtrade54321.ddns.net105.112.97.157A (IP address)IN (0x0001)

                                                                          Code Manipulations

                                                                          Statistics

                                                                          Behavior

                                                                          Click to jump to process

                                                                          System Behavior

                                                                          General

                                                                          Start time:16:40:50
                                                                          Start date:23/02/2021
                                                                          Path:C:\Users\user\Desktop\WxTm2cWLHF.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:'C:\Users\user\Desktop\WxTm2cWLHF.exe'
                                                                          Imagebase:0xaa0000
                                                                          File size:761344 bytes
                                                                          MD5 hash:DA6D54EF4DD6752367FF3F516196B292
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Yara matches:
                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.279715040.0000000003EB9000.00000004.00000001.sdmp, Author: Florian Roth
                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.279715040.0000000003EB9000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.279715040.0000000003EB9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.281914406.00000000043AE000.00000004.00000001.sdmp, Author: Florian Roth
                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.281914406.00000000043AE000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.281914406.00000000043AE000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                          Reputation:low

                                                                          General

                                                                          Start time:16:41:13
                                                                          Start date:23/02/2021
                                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eNEXCeqZvjFuTO' /XML 'C:\Users\user\AppData\Local\Temp\tmp30A3.tmp'
                                                                          Imagebase:0xf10000
                                                                          File size:185856 bytes
                                                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:16:41:14
                                                                          Start date:23/02/2021
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff7ecfc0000
                                                                          File size:625664 bytes
                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:16:41:14
                                                                          Start date:23/02/2021
                                                                          Path:C:\Users\user\Desktop\WxTm2cWLHF.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:{path}
                                                                          Imagebase:0xb40000
                                                                          File size:761344 bytes
                                                                          MD5 hash:DA6D54EF4DD6752367FF3F516196B292
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Yara matches:
                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmp, Author: Florian Roth
                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmp, Author: Florian Roth
                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.499194196.0000000006150000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.497750745.0000000003F29000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.497750745.0000000003F29000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.491562642.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.491562642.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                          • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.491562642.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.494580677.0000000002EE1000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.498775362.00000000055D0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.498775362.00000000055D0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                          Reputation:low

                                                                          Disassembly

                                                                          Code Analysis

                                                                          Reset < >