Loading ...

Play interactive tourEdit tour

Analysis Report 7lrH3syQoO.exe

Overview

General Information

Sample Name:7lrH3syQoO.exe
Analysis ID:385220
MD5:60c423711d537751bc90e037100aff0c
SHA1:ed0afa5c41f18c5c61866f2e097acbd091190037
SHA256:f57a18111a889d227696128ef7486897b7c35f2f81db4c6c930263786bbc2852
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • 7lrH3syQoO.exe (PID: 5960 cmdline: 'C:\Users\user\Desktop\7lrH3syQoO.exe' MD5: 60C423711D537751BC90E037100AFF0C)
    • schtasks.exe (PID: 6172 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\YwKZCbS' /XML 'C:\Users\user\AppData\Local\Temp\tmp6FAA.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 6260 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "456436c5-01a8-4b34-818a-a78bd296", "Group": "Default", "Domain1": "uyeco.pw", "Domain2": "127.0.0.1", "Port": 59044, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.502485666.00000000029D1000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000006.00000002.508407731.0000000005B30000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    00000006.00000002.508407731.0000000005B30000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    00000006.00000002.506658685.0000000003A31000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000000.00000002.273922733.0000000003E0D000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xa8045:$x1: NanoCore.ClientPluginHost
      • 0xda865:$x1: NanoCore.ClientPluginHost
      • 0xa8082:$x2: IClientNetworkHost
      • 0xda8a2:$x2: IClientNetworkHost
      • 0xabbb5:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      • 0xde3d5:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 16 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      6.2.RegSvcs.exe.5b30000.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      6.2.RegSvcs.exe.5b30000.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      0.2.7lrH3syQoO.exe.3ea4eb8.2.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe38d:$x1: NanoCore.ClientPluginHost
      • 0xe3ca:$x2: IClientNetworkHost
      • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0.2.7lrH3syQoO.exe.3ea4eb8.2.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe105:$x1: NanoCore Client.exe
      • 0xe38d:$x2: NanoCore.ClientPluginHost
      • 0xf9c6:$s1: PluginCommand
      • 0xf9ba:$s2: FileCommand
      • 0x1086b:$s3: PipeExists
      • 0x16622:$s4: PipeCreated
      • 0xe3b7:$s5: IClientLoggingHost
      0.2.7lrH3syQoO.exe.3ea4eb8.2.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 28 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6260, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\YwKZCbS' /XML 'C:\Users\user\AppData\Local\Temp\tmp6FAA.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\YwKZCbS' /XML 'C:\Users\user\AppData\Local\Temp\tmp6FAA.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\7lrH3syQoO.exe' , ParentImage: C:\Users\user\Desktop\7lrH3syQoO.exe, ParentProcessId: 5960, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\YwKZCbS' /XML 'C:\Users\user\AppData\Local\Temp\tmp6FAA.tmp', ProcessId: 6172

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000006.00000002.506658685.0000000003A31000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "456436c5-01a8-4b34-818a-a78bd296", "Group": "Default", "Domain1": "uyeco.pw", "Domain2": "127.0.0.1", "Port": 59044, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Multi AV Scanner detection for domain / URLShow sources
        Source: uyeco.pwVirustotal: Detection: 8%Perma Link
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\YwKZCbS.exeMetadefender: Detection: 27%Perma Link
        Source: C:\Users\user\AppData\Roaming\YwKZCbS.exeReversingLabs: Detection: 58%
        Multi AV Scanner detection for submitted fileShow sources
        Source: 7lrH3syQoO.exeVirustotal: Detection: 46%Perma Link
        Source: 7lrH3syQoO.exeMetadefender: Detection: 27%Perma Link
        Source: 7lrH3syQoO.exeReversingLabs: Detection: 58%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000006.00000002.502485666.00000000029D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.506658685.0000000003A31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.273922733.0000000003E0D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.498272914.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.508737173.0000000005C60000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6260, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 7lrH3syQoO.exe PID: 5960, type: MEMORY
        Source: Yara matchFile source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.5c60000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.3a38a08.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.5c60000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.3a38a08.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.5c64629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.3a3d031.2.raw.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\YwKZCbS.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: 7lrH3syQoO.exeJoe Sandbox ML: detected
        Source: 6.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 6.2.RegSvcs.exe.5c60000.8.unpackAvira: Label: TR/NanoCore.fadte
        Source: 7lrH3syQoO.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 7lrH3syQoO.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbMG source: RegSvcs.exe, 00000006.00000002.501144071.0000000000D6A000.00000004.00000020.sdmp
        Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: RegSvcs.exe, 00000006.00000002.501176054.0000000000E8B000.00000004.00000001.sdmp
        Source: Binary string: (P9j0C:\Windows\mscorlib.pdb source: RegSvcs.exe, 00000006.00000002.501176054.0000000000E8B000.00000004.00000001.sdmp
        Source: Binary string: mscorlib.pdb source: RegSvcs.exe, 00000006.00000003.447494278.000000000608F000.00000004.00000001.sdmp
        Source: Binary string: symbols\dll\mscorlib.pdb source: RegSvcs.exe, 00000006.00000002.501176054.0000000000E8B000.00000004.00000001.sdmp
        Source: Binary string: $.pdb source: RegSvcs.exe, 00000006.00000002.501176054.0000000000E8B000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbki source: RegSvcs.exe, 00000006.00000002.500391488.0000000000CC3000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbcD source: RegSvcs.exe, 00000006.00000002.501144071.0000000000D6A000.00000004.00000020.sdmp
        Source: Binary string: Svcs.pdb source: RegSvcs.exe, 00000006.00000002.500391488.0000000000CC3000.00000004.00000020.sdmp
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49717 -> 172.94.38.41:59044
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49721 -> 172.94.38.41:59044
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49722 -> 172.94.38.41:59044
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49723 -> 172.94.38.41:59044
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49725 -> 172.94.38.41:59044
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49726 -> 172.94.38.41:59044
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49729 -> 172.94.38.41:59044
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49732 -> 172.94.38.41:59044
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49733 -> 172.94.38.41:59044
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49734 -> 172.94.38.41:59044
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49736 -> 172.94.38.41:59044
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49737 -> 172.94.38.41:59044
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49738 -> 172.94.38.41:59044
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49741 -> 172.94.38.41:59044
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49742 -> 172.94.38.41:59044
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: uyeco.pw
        Source: Malware configuration extractorURLs: 127.0.0.1
        Source: unknownDNS traffic detected: queries for: uyeco.pw
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: 7lrH3syQoO.exeString found in binary or memory: http://gnu.org/licenses/gpl-3.0.txt
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: 7lrH3syQoO.exe, 00000000.00000003.237792549.0000000005D60000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmp, 7lrH3syQoO.exe, 00000000.00000003.244281911.0000000005D2F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: 7lrH3syQoO.exe, 00000000.00000003.244474317.0000000005D59000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers#
        Source: 7lrH3syQoO.exe, 00000000.00000003.241884313.0000000005D60000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/;
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: 7lrH3syQoO.exe, 00000000.00000003.244281911.0000000005D2F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlr
        Source: 7lrH3syQoO.exe, 00000000.00000003.241876644.0000000005D59000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/d
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmp, 7lrH3syQoO.exe, 00000000.00000003.243571139.0000000005D2F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: 7lrH3syQoO.exe, 00000000.00000003.243315622.0000000005D59000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmld
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: 7lrH3syQoO.exe, 00000000.00000003.252571308.0000000005D59000.00000004.00000001.sdmp, 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: 7lrH3syQoO.exe, 00000000.00000003.244757324.0000000005D59000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersA
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: 7lrH3syQoO.exe, 00000000.00000003.244557035.0000000005D59000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designerst
        Source: 7lrH3syQoO.exe, 00000000.00000003.243571139.0000000005D2F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com=
        Source: 7lrH3syQoO.exe, 00000000.00000003.243571139.0000000005D2F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF)r
        Source: 7lrH3syQoO.exe, 00000000.00000003.244908954.0000000005D2F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF;r
        Source: 7lrH3syQoO.exe, 00000000.00000003.243571139.0000000005D2F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comI.TTF
        Source: 7lrH3syQoO.exe, 00000000.00000003.243571139.0000000005D2F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
        Source: 7lrH3syQoO.exe, 00000000.00000003.242222471.0000000005D2E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comaUre
        Source: 7lrH3syQoO.exe, 00000000.00000003.245116208.0000000005D2E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalic
        Source: 7lrH3syQoO.exe, 00000000.00000003.244281911.0000000005D2F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comcomaUre
        Source: 7lrH3syQoO.exe, 00000000.00000003.244908954.0000000005D2F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdCr
        Source: 7lrH3syQoO.exe, 00000000.00000003.243571139.0000000005D2F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdeta
        Source: 7lrH3syQoO.exe, 00000000.00000003.242222471.0000000005D2E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdiavfr
        Source: 7lrH3syQoO.exe, 00000000.00000003.245116208.0000000005D2E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdxr
        Source: 7lrH3syQoO.exe, 00000000.00000003.244908954.0000000005D2F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comessedxr
        Source: 7lrH3syQoO.exe, 00000000.00000003.243571139.0000000005D2F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comion
        Source: 7lrH3syQoO.exe, 00000000.00000003.244908954.0000000005D2F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comlicqr
        Source: 7lrH3syQoO.exe, 00000000.00000003.271362322.0000000005D20000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comm
        Source: 7lrH3syQoO.exe, 00000000.00000003.244908954.0000000005D2F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.como
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: 7lrH3syQoO.exe, 00000000.00000003.237390730.0000000005D5C000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: 7lrH3syQoO.exe, 00000000.00000003.237133863.0000000005D5A000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnw
        Source: 7lrH3syQoO.exe, 00000000.00000003.247360018.0000000005D59000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
        Source: 7lrH3syQoO.exe, 00000000.00000003.247534513.0000000005D2E000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/Cr
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: 7lrH3syQoO.exe, 00000000.00000003.247840153.0000000005D60000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/den
        Source: 7lrH3syQoO.exe, 00000000.00000003.249180787.0000000005D37000.00000004.00000001.sdmp, 7lrH3syQoO.exe, 00000000.00000003.247329878.0000000005D60000.00000004.00000001.sdmp, 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: 7lrH3syQoO.exe, 00000000.00000003.247534513.0000000005D2E000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/xr
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: 7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: 7lrH3syQoO.exe, 00000000.00000003.238988379.0000000005D2D000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/)
        Source: 7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Cr
        Source: 7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Jrl
        Source: 7lrH3syQoO.exe, 00000000.00000003.238988379.0000000005D2D000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Ure
        Source: 7lrH3syQoO.exe, 00000000.00000003.239064536.0000000005D2D000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0ntCr
        Source: 7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/help
        Source: 7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: 7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/Ure
        Source: 7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/lM
        Source: 7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmp, 7lrH3syQoO.exe, 00000000.00000003.238988379.0000000005D2D000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/nt
        Source: 7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/qr
        Source: 7lrH3syQoO.exe, 00000000.00000003.239483333.0000000005D23000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/t
        Source: 7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/tent
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: 7lrH3syQoO.exe, 00000000.00000003.237484277.0000000005D2E000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: 7lrH3syQoO.exe, 00000000.00000003.245116208.0000000005D2E000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: 7lrH3syQoO.exeString found in binary or memory: https://dav.box.com/dav
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
        Source: RegSvcs.exe, 00000006.00000002.506658685.0000000003A31000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000006.00000002.502485666.00000000029D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.506658685.0000000003A31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.273922733.0000000003E0D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.498272914.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.508737173.0000000005C60000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6260, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 7lrH3syQoO.exe PID: 5960, type: MEMORY
        Source: Yara matchFile source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.5c60000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.3a38a08.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.5c60000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.3a38a08.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.5c64629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.3a3d031.2.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000006.00000002.508407731.0000000005B30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.273922733.0000000003E0D000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.273922733.0000000003E0D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.498272914.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.498272914.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.508737173.0000000005C60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegSvcs.exe PID: 6260, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegSvcs.exe PID: 6260, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: 7lrH3syQoO.exe PID: 5960, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: 7lrH3syQoO.exe PID: 5960, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.RegSvcs.exe.5b30000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.RegSvcs.exe.5c60000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.RegSvcs.exe.3a38a08.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.RegSvcs.exe.5c60000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.RegSvcs.exe.3a38a08.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.RegSvcs.exe.5c64629.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.RegSvcs.exe.3a3d031.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.RegSvcs.exe.2a05f44.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07794610 NtQueryInformationProcess,
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07794609 NtQueryInformationProcess,
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_009B269C
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07799FE0
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07793268
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07795DE8
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_0779ADE8
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_0779BC68
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_0779E868
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07790040
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07790C18
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07790B63
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07794708
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_077957E8
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_077957E7
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_077947A8
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07794799
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07793B88
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07793B85
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07796E60
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07793258
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07796E4F
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07793211
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07797D4F
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07793520
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07793510
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_077969B0
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_077969A0
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07795D9F
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07795D86
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_0779B828
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07790007
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_028BE480
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_028BE471
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_028BBBD4
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_06130040
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_06138DC0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0613D306
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_06139A96
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_061399D8
        Source: 7lrH3syQoO.exeBinary or memory string: OriginalFilename vs 7lrH3syQoO.exe
        Source: 7lrH3syQoO.exe, 00000000.00000002.282695361.000000000EB90000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs 7lrH3syQoO.exe
        Source: 7lrH3syQoO.exe, 00000000.00000002.273137858.0000000002D5F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll2 vs 7lrH3syQoO.exe
        Source: 7lrH3syQoO.exe, 00000000.00000000.232964393.00000000009B2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFieldAttributes.exe> vs 7lrH3syQoO.exe
        Source: 7lrH3syQoO.exe, 00000000.00000002.282272621.000000000E145000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFieldA vs 7lrH3syQoO.exe
        Source: 7lrH3syQoO.exe, 00000000.00000002.273922733.0000000003E0D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll" vs 7lrH3syQoO.exe
        Source: 7lrH3syQoO.exe, 00000000.00000002.281743375.00000000077E0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs 7lrH3syQoO.exe
        Source: 7lrH3syQoO.exe, 00000000.00000002.281743375.00000000077E0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs 7lrH3syQoO.exe
        Source: 7lrH3syQoO.exe, 00000000.00000002.275081186.0000000004D30000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs 7lrH3syQoO.exe
        Source: 7lrH3syQoO.exeBinary or memory string: OriginalFilenameFieldAttributes.exe> vs 7lrH3syQoO.exe
        Source: 7lrH3syQoO.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000006.00000002.508407731.0000000005B30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.508407731.0000000005B30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000000.00000002.273922733.0000000003E0D000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.273922733.0000000003E0D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.498272914.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.498272914.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.508737173.0000000005C60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.508737173.0000000005C60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: Process Memory Space: RegSvcs.exe PID: 6260, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: RegSvcs.exe PID: 6260, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: 7lrH3syQoO.exe PID: 5960, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: 7lrH3syQoO.exe PID: 5960, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.RegSvcs.exe.5b30000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.RegSvcs.exe.5b30000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.RegSvcs.exe.5c60000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.RegSvcs.exe.5c60000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.RegSvcs.exe.3a38a08.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.RegSvcs.exe.3a38a08.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.RegSvcs.exe.5c60000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.RegSvcs.exe.5c60000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.RegSvcs.exe.3a38a08.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.RegSvcs.exe.3a38a08.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.RegSvcs.exe.5c64629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.RegSvcs.exe.5c64629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.RegSvcs.exe.3a3d031.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.RegSvcs.exe.3a3d031.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.RegSvcs.exe.2a05f44.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.RegSvcs.exe.2a05f44.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7lrH3syQoO.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: YwKZCbS.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 6.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 6.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 6.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@6/6@15/1
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeFile created: C:\Users\user\AppData\Roaming\YwKZCbS.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6180:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{456436c5-01a8-4b34-818a-a78bd296d065}
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeFile created: C:\Users\user\AppData\Local\Temp\tmp6FAA.tmpJump to behavior
        Source: 7lrH3syQoO.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: Select * from UnmanagedMemoryStreamWrapper WHERE modelo=@modelo;?
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel5Erro ao listar Banco sql-UnmanagedMemoryStreamWrapper.INSERT INTO Aluguel VALUES(@clienteID, @data);
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: INSERT INTO UnmanagedMemoryStreamWrapper VALUES(@modelo, @fabricante, @ano, @cor);
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
        Source: 7lrH3syQoO.exeVirustotal: Detection: 46%
        Source: 7lrH3syQoO.exeMetadefender: Detection: 27%
        Source: 7lrH3syQoO.exeReversingLabs: Detection: 58%
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeFile read: C:\Users\user\Desktop\7lrH3syQoO.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\7lrH3syQoO.exe 'C:\Users\user\Desktop\7lrH3syQoO.exe'
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\YwKZCbS' /XML 'C:\Users\user\AppData\Local\Temp\tmp6FAA.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\YwKZCbS' /XML 'C:\Users\user\AppData\Local\Temp\tmp6FAA.tmp'
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: 7lrH3syQoO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: 7lrH3syQoO.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbMG source: RegSvcs.exe, 00000006.00000002.501144071.0000000000D6A000.00000004.00000020.sdmp
        Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: RegSvcs.exe, 00000006.00000002.501176054.0000000000E8B000.00000004.00000001.sdmp
        Source: Binary string: (P9j0C:\Windows\mscorlib.pdb source: RegSvcs.exe, 00000006.00000002.501176054.0000000000E8B000.00000004.00000001.sdmp
        Source: Binary string: mscorlib.pdb source: RegSvcs.exe, 00000006.00000003.447494278.000000000608F000.00000004.00000001.sdmp
        Source: Binary string: symbols\dll\mscorlib.pdb source: RegSvcs.exe, 00000006.00000002.501176054.0000000000E8B000.00000004.00000001.sdmp
        Source: Binary string: $.pdb source: RegSvcs.exe, 00000006.00000002.501176054.0000000000E8B000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbki source: RegSvcs.exe, 00000006.00000002.500391488.0000000000CC3000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbcD source: RegSvcs.exe, 00000006.00000002.501144071.0000000000D6A000.00000004.00000020.sdmp
        Source: Binary string: Svcs.pdb source: RegSvcs.exe, 00000006.00000002.500391488.0000000000CC3000.00000004.00000020.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 6.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_009BA578 push es; iretd
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeCode function: 0_2_07790970 push ecx; retf
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0613C8DA push 8B000005h; retf
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0613BFD8 pushad ; ret
        Source: initial sampleStatic PE information: section name: .text entropy: 7.79874403278
        Source: initial sampleStatic PE information: section name: .text entropy: 7.79874403278
        Source: 6.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 6.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeFile created: C:\Users\user\AppData\Roaming\YwKZCbS.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\YwKZCbS' /XML 'C:\Users\user\AppData\Local\Temp\tmp6FAA.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 7lrH3syQoO.exe PID: 5960, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6140
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3140
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: foregroundWindowGot 826
        Source: C:\Users\user\Desktop\7lrH3syQoO.exe TID: 5924Thread sleep time: -101938s >= -30000s
        Source: C:\Users\user\Desktop\7lrH3syQoO.exe TID: 3020Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeThread delayed: delay time: 101938
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: RegSvcs.exe, 00000006.00000002.509413081.0000000006B40000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: RegSvcs.exe, 00000006.00000002.509413081.0000000006B40000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: RegSvcs.exe, 00000006.00000002.509413081.0000000006B40000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: 7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: RegSvcs.exe, 00000006.00000002.500842081.0000000000D37000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: RegSvcs.exe, 00000006.00000002.509413081.0000000006B40000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 420000
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 422000
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 9D7008
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\YwKZCbS' /XML 'C:\Users\user\AppData\Local\Temp\tmp6FAA.tmp'
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        Source: RegSvcs.exe, 00000006.00000002.502804778.0000000002AAE000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: RegSvcs.exe, 00000006.00000002.501338804.0000000001280000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: RegSvcs.exe, 00000006.00000002.501338804.0000000001280000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: RegSvcs.exe, 00000006.00000002.501338804.0000000001280000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
        Source: RegSvcs.exe, 00000006.00000002.509206452.000000000627D000.00000004.00000001.sdmpBinary or memory string: Program Manager 4L
        Source: RegSvcs.exe, 00000006.00000002.509357347.000000000677D000.00000004.00000001.sdmpBinary or memory string: Program ManagerL
        Source: RegSvcs.exe, 00000006.00000002.501338804.0000000001280000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
        Source: RegSvcs.exe, 00000006.00000002.501338804.0000000001280000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: RegSvcs.exe, 00000006.00000002.502637344.0000000002A2D000.00000004.00000001.sdmpBinary or memory string: Program Managert
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Users\user\Desktop\7lrH3syQoO.exe VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\7lrH3syQoO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000006.00000002.502485666.00000000029D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.506658685.0000000003A31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.273922733.0000000003E0D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.498272914.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.508737173.0000000005C60000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6260, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 7lrH3syQoO.exe PID: 5960, type: MEMORY
        Source: Yara matchFile source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.5c60000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.3a38a08.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.5c60000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.3a38a08.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.5c64629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.3a3d031.2.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: 7lrH3syQoO.exe, 00000000.00000002.273922733.0000000003E0D000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000006.00000002.502485666.00000000029D1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000006.00000002.502485666.00000000029D1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000006.00000002.502485666.00000000029D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.506658685.0000000003A31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.273922733.0000000003E0D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.498272914.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.508737173.0000000005C60000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6260, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 7lrH3syQoO.exe PID: 5960, type: MEMORY
        Source: Yara matchFile source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.5c60000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.3a38a08.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.5c60000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.3a38a08.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.5c64629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.7lrH3syQoO.exe.3ea4eb8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.RegSvcs.exe.3a3d031.2.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection212Masquerading1Input Capture11Security Software Discovery211Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothRemote Access Software1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection212NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        7lrH3syQoO.exe46%VirustotalBrowse
        7lrH3syQoO.exe30%MetadefenderBrowse
        7lrH3syQoO.exe58%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        7lrH3syQoO.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\YwKZCbS.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\YwKZCbS.exe30%MetadefenderBrowse
        C:\Users\user\AppData\Roaming\YwKZCbS.exe58%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        6.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        6.2.RegSvcs.exe.5c60000.8.unpack100%AviraTR/NanoCore.fadteDownload File

        Domains

        SourceDetectionScannerLabelLink
        uyeco.pw8%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://www.fontbureau.comI.TTF0%URL Reputationsafe
        http://www.fontbureau.comI.TTF0%URL Reputationsafe
        http://www.fontbureau.comI.TTF0%URL Reputationsafe
        http://www.fontbureau.comI.TTF0%URL Reputationsafe
        http://www.fontbureau.comlicqr0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Cr0%Avira URL Cloudsafe
        http://www.fontbureau.comdxr0%Avira URL Cloudsafe
        http://www.fontbureau.comF;r0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Y0ntCr0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        uyeco.pw0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/help0%Avira URL Cloudsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/qr0%Avira URL Cloudsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.fontbureau.comessedxr0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnw0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/staff/den0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/)0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/)0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/)0%URL Reputationsafe
        http://www.fontbureau.comaUre0%Avira URL Cloudsafe
        http://www.fontbureau.comdeta0%Avira URL Cloudsafe
        http://www.fontbureau.comdiavfr0%Avira URL Cloudsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.de0%URL Reputationsafe
        http://www.urwpp.de0%URL Reputationsafe
        http://www.urwpp.de0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Ure0%Avira URL Cloudsafe
        http://www.fontbureau.comdCr0%Avira URL Cloudsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.fontbureau.com=0%Avira URL Cloudsafe
        127.0.0.10%Avira URL Cloudsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/nt0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/tent0%Avira URL Cloudsafe
        http://www.fontbureau.comcomaUre0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/xr0%Avira URL Cloudsafe
        http://www.fontbureau.comion0%URL Reputationsafe
        http://www.fontbureau.comion0%URL Reputationsafe
        http://www.fontbureau.comion0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/lM0%Avira URL Cloudsafe
        http://www.tiro.0%URL Reputationsafe
        http://www.tiro.0%URL Reputationsafe
        http://www.tiro.0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/t0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/t0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/t0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        uyeco.pw
        172.94.38.41
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        uyeco.pwtrue
        • Avira URL Cloud: safe
        unknown
        127.0.0.1true
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.fontbureau.com/designers/;7lrH3syQoO.exe, 00000000.00000003.241884313.0000000005D60000.00000004.00000001.sdmpfalse
          high
          http://www.fontbureau.com/designersG7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
            high
            http://www.fontbureau.comI.TTF7lrH3syQoO.exe, 00000000.00000003.243571139.0000000005D2F000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers/?7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
              high
              http://www.fontbureau.comlicqr7lrH3syQoO.exe, 00000000.00000003.244908954.0000000005D2F000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.founder.com.cn/cn/bThe7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designersA7lrH3syQoO.exe, 00000000.00000003.244757324.0000000005D59000.00000004.00000001.sdmpfalse
                high
                http://www.jiyu-kobo.co.jp/Cr7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designers?7lrH3syQoO.exe, 00000000.00000003.252571308.0000000005D59000.00000004.00000001.sdmp, 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                  high
                  http://www.fontbureau.comdxr7lrH3syQoO.exe, 00000000.00000003.245116208.0000000005D2E000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.comF;r7lrH3syQoO.exe, 00000000.00000003.244908954.0000000005D2F000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.jiyu-kobo.co.jp/Y0ntCr7lrH3syQoO.exe, 00000000.00000003.239064536.0000000005D2D000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.tiro.com7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/help7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.com/designers7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                    high
                    https://dav.box.com/dav7lrH3syQoO.exefalse
                      high
                      http://www.goodfont.co.kr7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/qr7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.sajatypeworks.com7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netD7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/cThe7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htm7lrH3syQoO.exe, 00000000.00000003.249180787.0000000005D37000.00000004.00000001.sdmp, 7lrH3syQoO.exe, 00000000.00000003.247329878.0000000005D60000.00000004.00000001.sdmp, 7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.com7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comessedxr7lrH3syQoO.exe, 00000000.00000003.244908954.0000000005D2F000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.founder.com.cn/cnw7lrH3syQoO.exe, 00000000.00000003.237133863.0000000005D5A000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.galapagosdesign.com/staff/den7lrH3syQoO.exe, 00000000.00000003.247840153.0000000005D60000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://gnu.org/licenses/gpl-3.0.txt7lrH3syQoO.exefalse
                          high
                          http://www.galapagosdesign.com/DPlease7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/)7lrH3syQoO.exe, 00000000.00000003.238988379.0000000005D2D000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comaUre7lrH3syQoO.exe, 00000000.00000003.242222471.0000000005D2E000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.comdeta7lrH3syQoO.exe, 00000000.00000003.243571139.0000000005D2F000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.comdiavfr7lrH3syQoO.exe, 00000000.00000003.242222471.0000000005D2E000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fonts.com7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                            high
                            http://www.sandoll.co.kr7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deDPlease7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.de7lrH3syQoO.exe, 00000000.00000003.245116208.0000000005D2E000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cn7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/Ure7lrH3syQoO.exe, 00000000.00000003.238988379.0000000005D2D000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name7lrH3syQoO.exe, 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmpfalse
                              high
                              http://www.fontbureau.comdCr7lrH3syQoO.exe, 00000000.00000003.244908954.0000000005D2F000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.sakkal.com7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designerst7lrH3syQoO.exe, 00000000.00000003.244557035.0000000005D59000.00000004.00000001.sdmpfalse
                                high
                                http://www.fontbureau.com=7lrH3syQoO.exe, 00000000.00000003.243571139.0000000005D2F000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.apache.org/licenses/LICENSE-2.07lrH3syQoO.exe, 00000000.00000003.237792549.0000000005D60000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.fontbureau.com7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmp, 7lrH3syQoO.exe, 00000000.00000003.244281911.0000000005D2F000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.galapagosdesign.com/7lrH3syQoO.exe, 00000000.00000003.247360018.0000000005D59000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/nt7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmp, 7lrH3syQoO.exe, 00000000.00000003.238988379.0000000005D2D000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlr7lrH3syQoO.exe, 00000000.00000003.244281911.0000000005D2F000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.jiyu-kobo.co.jp/tent7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-jones.htmld7lrH3syQoO.exe, 00000000.00000003.243315622.0000000005D59000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.fontbureau.comcomaUre7lrH3syQoO.exe, 00000000.00000003.244281911.0000000005D2F000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.galapagosdesign.com/xr7lrH3syQoO.exe, 00000000.00000003.247534513.0000000005D2E000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.fontbureau.comion7lrH3syQoO.exe, 00000000.00000003.243571139.0000000005D2F000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.jiyu-kobo.co.jp/jp/7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.coma7lrH3syQoO.exe, 00000000.00000003.243571139.0000000005D2F000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.carterandcone.coml7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.jiyu-kobo.co.jp/lM7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.tiro.7lrH3syQoO.exe, 00000000.00000003.237484277.0000000005D2E000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cn/7lrH3syQoO.exe, 00000000.00000003.237390730.0000000005D5C000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/cabarga.htmlN7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cn7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/frere-jones.html7lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmp, 7lrH3syQoO.exe, 00000000.00000003.243571139.0000000005D2F000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.jiyu-kobo.co.jp/t7lrH3syQoO.exe, 00000000.00000003.239483333.0000000005D23000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.comm7lrH3syQoO.exe, 00000000.00000003.271362322.0000000005D20000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.jiyu-kobo.co.jp/7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers#7lrH3syQoO.exe, 00000000.00000003.244474317.0000000005D59000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.fontbureau.como7lrH3syQoO.exe, 00000000.00000003.244908954.0000000005D2F000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.galapagosdesign.com/Cr7lrH3syQoO.exe, 00000000.00000003.247534513.0000000005D2E000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fontbureau.com/designers87lrH3syQoO.exe, 00000000.00000002.279802834.0000000006F32000.00000004.00000001.sdmpfalse
                                                high
                                                http://www.fontbureau.comalic7lrH3syQoO.exe, 00000000.00000003.245116208.0000000005D2E000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.com/designers/d7lrH3syQoO.exe, 00000000.00000003.241876644.0000000005D59000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://www.jiyu-kobo.co.jp/jp/Ure7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.jiyu-kobo.co.jp/Jrl7lrH3syQoO.exe, 00000000.00000003.239841290.0000000005D2C000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.fontbureau.comF)r7lrH3syQoO.exe, 00000000.00000003.243571139.0000000005D2F000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  low

                                                  Contacted IPs

                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs

                                                  Public

                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  172.94.38.41
                                                  uyeco.pwUnited States
                                                  209378INIOS-ASFItrue

                                                  General Information

                                                  Joe Sandbox Version:31.0.0 Emerald
                                                  Analysis ID:385220
                                                  Start date:12.04.2021
                                                  Start time:08:29:22
                                                  Joe Sandbox Product:CloudBasic
                                                  Overall analysis duration:0h 8m 2s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:light
                                                  Sample file name:7lrH3syQoO.exe
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                  Number of analysed new started processes analysed:23
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • HDC enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Detection:MAL
                                                  Classification:mal100.troj.evad.winEXE@6/6@15/1
                                                  EGA Information:Failed
                                                  HDC Information:
                                                  • Successful, ratio: 1.7% (good quality ratio 1.3%)
                                                  • Quality average: 53.2%
                                                  • Quality standard deviation: 36.3%
                                                  HCA Information:
                                                  • Successful, ratio: 93%
                                                  • Number of executed functions: 0
                                                  • Number of non-executed functions: 0
                                                  Cookbook Comments:
                                                  • Adjust boot time
                                                  • Enable AMSI
                                                  • Found application associated with file extension: .exe
                                                  Warnings:
                                                  Show All
                                                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                                  • TCP Packets have been reduced to 100
                                                  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                                                  • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 168.61.161.212, 104.43.139.144, 40.88.32.150, 23.210.248.85, 20.82.210.154, 2.20.142.209, 2.20.142.210, 20.50.102.62, 92.122.213.194, 92.122.213.247, 20.54.26.129
                                                  • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus15.cloudapp.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, fs.microsoft.com, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, blobcollector.events.data.trafficmanager.net
                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.

                                                  Simulations

                                                  Behavior and APIs

                                                  TimeTypeDescription
                                                  08:30:27API Interceptor2x Sleep call for process: 7lrH3syQoO.exe modified
                                                  08:30:36API Interceptor882x Sleep call for process: RegSvcs.exe modified

                                                  Joe Sandbox View / Context

                                                  IPs

                                                  No context

                                                  Domains

                                                  No context

                                                  ASN

                                                  No context

                                                  JA3 Fingerprints

                                                  No context

                                                  Dropped Files

                                                  No context

                                                  Created / dropped Files

                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\7lrH3syQoO.exe.log
                                                  Process:C:\Users\user\Desktop\7lrH3syQoO.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:modified
                                                  Size (bytes):1216
                                                  Entropy (8bit):5.355304211458859
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                  MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                  SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                  SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                  SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                  Malicious:true
                                                  Reputation:moderate, very likely benign file
                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                  C:\Users\user\AppData\Local\Temp\tmp6FAA.tmp
                                                  Process:C:\Users\user\Desktop\7lrH3syQoO.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1644
                                                  Entropy (8bit):5.17517889346709
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGtn:cbhC7ZlNQF/rydbz9I3YODOLNdq3S
                                                  MD5:FA4DBA4671B647E90B8DE5521E76989E
                                                  SHA1:2467E3E2742EF64AE5FE76A40365463D47729C16
                                                  SHA-256:A510BED32A4AAD1D8C964B9926AA173F0DBE9B6EFE602912935CE9DB875EBBD9
                                                  SHA-512:F2B7A2924A351F47E6B1004C99C0050290BC981AD9B8943C9D7534D8654F2C6F453CBFAAE80BFF0B1FF359C2EBBD811D79E850C9FB90947335D99F75A4817891
                                                  Malicious:true
                                                  Reputation:low
                                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):3016
                                                  Entropy (8bit):7.024371743172393
                                                  Encrypted:false
                                                  SSDEEP:48:Ik/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrws:flC0IlC0IlC0IlC0IlC0IlC0IlC0IlCe
                                                  MD5:1BD61AD9406ED789A9447AF5E4E1368C
                                                  SHA1:10C211612AAFC0F9A3E5DD15A45EDC08E5D76038
                                                  SHA-256:AD46B72200459E73CDEBC96C7A48468559D68DDC223627FBE4BCF93F32311F57
                                                  SHA-512:79EF944DE5355166735808D59ABB8EB7AEF35BCFF537DD60783CAD75FC98FC9649D971C3A36A1566EA26B28FFAD57E9BC065BFF7D0B26E868AB2B2FC1DC39DBC
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):8
                                                  Entropy (8bit):3.0
                                                  Encrypted:false
                                                  SSDEEP:3:pO5t:Qt
                                                  MD5:72E2136A7035BE4057449D4AA6EFD990
                                                  SHA1:1FD477932471ED26751A9AA005CD7B0549D44F4B
                                                  SHA-256:DD383AE48A85C931941CDEC698D141D8F36FA342AA77EA99AF0A86EA6E9F10ED
                                                  SHA-512:A844CC7D36146299A0259C76CCC967B72EF17B567F4F45E79B74AF9FBAF8DAA89A8241910AA8AA9F38D61C1115DD8516E2EFF9951EF676FBA129AF1BECACCCAC
                                                  Malicious:true
                                                  Reputation:low
                                                  Preview: ..M....H
                                                  C:\Users\user\AppData\Roaming\YwKZCbS.exe
                                                  Process:C:\Users\user\Desktop\7lrH3syQoO.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):672256
                                                  Entropy (8bit):7.785855042248575
                                                  Encrypted:false
                                                  SSDEEP:12288:PA1VAO6pPeZvyhDaFOrfY79pi2A0BvCEiMjVQkz0YKdOqLD0yqYlU:PIAO6pPmYaMQ4QCUjVQkI8w07uU
                                                  MD5:60C423711D537751BC90E037100AFF0C
                                                  SHA1:ED0AFA5C41F18C5C61866F2E097ACBD091190037
                                                  SHA-256:F57A18111A889D227696128EF7486897B7C35F2F81DB4C6C930263786BBC2852
                                                  SHA-512:29CDD6C053C29C23CEADF5015EBD8B828195E059FBB39133DC50CB3E9E7C3AC66847F8A357E68B96C6B74431ABE5B70C1032C20A89D53302F60059896D4A8A2F
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: Metadefender, Detection: 30%, Browse
                                                  • Antivirus: ReversingLabs, Detection: 58%
                                                  Reputation:low
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....m`..............P......".......=... ...@....@.. ....................................@.................................\=..O....@..t....................`....................................................... ............... ..H............text........ ...................... ..`.rsrc...t....@... ... ..............@..@.reloc.......`.......@..............@..B.................=......H.......d...@.......h....u................................................(....*&..( ....*.s!........s"........s#........s$........s%........*...0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0...........~....o)....+..*.0...........~....o*....+..*.0..<........~.....(+.....,!r...p.....(,...o-...s.............~.....+..*.0...........~.....+..*".......*.0..&........(....r3..p~....o/...(0.....t%....+..*...0..&........(....rE..p~....o/...(0.....
                                                  C:\Users\user\AppData\Roaming\YwKZCbS.exe:Zone.Identifier
                                                  Process:C:\Users\user\Desktop\7lrH3syQoO.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):26
                                                  Entropy (8bit):3.95006375643621
                                                  Encrypted:false
                                                  SSDEEP:3:ggPYV:rPYV
                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                  Malicious:true
                                                  Reputation:high, very likely benign file
                                                  Preview: [ZoneTransfer]....ZoneId=0

                                                  Static File Info

                                                  General

                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.785855042248575
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Windows Screen Saver (13104/52) 0.07%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  File name:7lrH3syQoO.exe
                                                  File size:672256
                                                  MD5:60c423711d537751bc90e037100aff0c
                                                  SHA1:ed0afa5c41f18c5c61866f2e097acbd091190037
                                                  SHA256:f57a18111a889d227696128ef7486897b7c35f2f81db4c6c930263786bbc2852
                                                  SHA512:29cdd6c053c29c23ceadf5015ebd8b828195e059fbb39133dc50cb3e9e7c3ac66847f8a357e68b96c6b74431abe5b70c1032c20a89d53302f60059896d4a8a2f
                                                  SSDEEP:12288:PA1VAO6pPeZvyhDaFOrfY79pi2A0BvCEiMjVQkz0YKdOqLD0yqYlU:PIAO6pPmYaMQ4QCUjVQkI8w07uU
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....m`..............P......".......=... ...@....@.. ....................................@................................

                                                  File Icon

                                                  Icon Hash:acd292d2c9ccb698

                                                  Static PE Info

                                                  General

                                                  Entrypoint:0x4a3dae
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                  Time Stamp:0x606D06EB [Wed Apr 7 01:12:11 2021 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:v4.0.30319
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                  Entrypoint Preview

                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al

                                                  Data Directories

                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xa3d5c0x4f.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xa40000x1f74.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xa60000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                  Sections

                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000xa1db40xa1e00False0.859411196911data7.79874403278IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                  .rsrc0xa40000x1f740x2000False0.375732421875data6.01422569737IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xa60000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                  Resources

                                                  NameRVASizeTypeLanguageCountry
                                                  RT_ICON0xa41300x10a8data
                                                  RT_GROUP_ICON0xa51d80x14data
                                                  RT_VERSION0xa51ec0x3acdata
                                                  RT_MANIFEST0xa55980x9d9XML 1.0 document, UTF-8 Unicode (with BOM) text

                                                  Imports

                                                  DLLImport
                                                  mscoree.dll_CorExeMain

                                                  Version Infos

                                                  DescriptionData
                                                  Translation0x0000 0x04b0
                                                  LegalCopyrightCopyright 2012
                                                  Assembly Version0.1.0.0
                                                  InternalNameFieldAttributes.exe
                                                  FileVersion0.1.0.0
                                                  CompanyNameChristopher Diekkamp
                                                  LegalTrademarks
                                                  CommentsTally Input Output Processor
                                                  ProductNameTallyProcessor
                                                  ProductVersion0.1.0.0
                                                  FileDescriptionTallyProcessor
                                                  OriginalFilenameFieldAttributes.exe

                                                  Network Behavior

                                                  Snort IDS Alerts

                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                  04/12/21-08:30:38.017655TCP2025019ET TROJAN Possible NanoCore C2 60B4971759044192.168.2.5172.94.38.41
                                                  04/12/21-08:30:45.033039TCP2025019ET TROJAN Possible NanoCore C2 60B4972159044192.168.2.5172.94.38.41
                                                  04/12/21-08:30:52.546499TCP2025019ET TROJAN Possible NanoCore C2 60B4972259044192.168.2.5172.94.38.41
                                                  04/12/21-08:30:59.159888TCP2025019ET TROJAN Possible NanoCore C2 60B4972359044192.168.2.5172.94.38.41
                                                  04/12/21-08:31:09.649454TCP2025019ET TROJAN Possible NanoCore C2 60B4972559044192.168.2.5172.94.38.41
                                                  04/12/21-08:31:17.242218TCP2025019ET TROJAN Possible NanoCore C2 60B4972659044192.168.2.5172.94.38.41
                                                  04/12/21-08:31:23.825988TCP2025019ET TROJAN Possible NanoCore C2 60B4972959044192.168.2.5172.94.38.41
                                                  04/12/21-08:31:31.163145TCP2025019ET TROJAN Possible NanoCore C2 60B4973259044192.168.2.5172.94.38.41
                                                  04/12/21-08:31:37.953804TCP2025019ET TROJAN Possible NanoCore C2 60B4973359044192.168.2.5172.94.38.41
                                                  04/12/21-08:31:44.974754TCP2025019ET TROJAN Possible NanoCore C2 60B4973459044192.168.2.5172.94.38.41
                                                  04/12/21-08:31:51.756158TCP2025019ET TROJAN Possible NanoCore C2 60B4973659044192.168.2.5172.94.38.41
                                                  04/12/21-08:31:58.722742TCP2025019ET TROJAN Possible NanoCore C2 60B4973759044192.168.2.5172.94.38.41
                                                  04/12/21-08:32:05.906274TCP2025019ET TROJAN Possible NanoCore C2 60B4973859044192.168.2.5172.94.38.41
                                                  04/12/21-08:32:12.942153TCP2025019ET TROJAN Possible NanoCore C2 60B4974159044192.168.2.5172.94.38.41
                                                  04/12/21-08:32:19.885617TCP2025019ET TROJAN Possible NanoCore C2 60B4974259044192.168.2.5172.94.38.41

                                                  Network Port Distribution

                                                  TCP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Apr 12, 2021 08:30:37.570306063 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:37.819314957 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:37.819504023 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:38.017654896 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:38.304229975 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:38.401185989 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:38.440798998 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:38.691380024 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:38.691514969 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:38.982623100 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:38.983216047 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.304588079 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.351990938 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.352025032 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.352044106 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.352060080 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.352077961 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.352160931 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.352212906 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.352741957 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.352761030 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.352801085 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.352842093 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.352843046 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.352876902 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.354060888 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.356270075 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.602499962 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.602538109 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.602564096 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.602587938 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.602653980 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.602689028 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.604804039 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.604837894 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.604861975 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.604945898 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.605321884 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.605376005 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.605417013 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.605454922 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.605480909 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.605504990 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.605505943 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.605530977 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.605554104 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.605576992 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.605580091 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.605608940 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.608419895 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.608448982 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.608473063 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.608496904 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.608515978 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.608576059 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.609206915 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.609306097 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.617131948 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.845820904 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.845856905 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.845880032 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.845901012 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.845921993 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.845999002 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.846029043 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.846474886 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.846681118 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.846715927 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.846734047 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.846797943 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.846853018 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.846853971 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.847007990 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.847661972 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.847681999 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.847697973 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.847724915 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.847748041 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.847758055 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.847768068 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.847804070 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.847817898 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.847843885 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.854232073 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.854263067 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.854285955 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.854305983 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.854326963 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.854403019 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.854484081 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.855159044 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.855227947 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.855299950 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.855305910 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.855324030 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.855341911 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.855355024 CEST4971759044192.168.2.5172.94.38.41
                                                  Apr 12, 2021 08:30:39.855375051 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.855413914 CEST5904449717172.94.38.41192.168.2.5
                                                  Apr 12, 2021 08:30:39.855428934 CEST5904449717172.94.38.41192.168.2.5

                                                  UDP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Apr 12, 2021 08:30:08.134051085 CEST4955753192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:08.191258907 CEST53495578.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:30:08.421972990 CEST6173353192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:08.482515097 CEST53617338.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:30:09.466720104 CEST6544753192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:09.526801109 CEST53654478.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:30:10.401020050 CEST5244153192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:10.454765081 CEST53524418.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:30:11.337688923 CEST6217653192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:11.389236927 CEST53621768.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:30:13.228276968 CEST5959653192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:13.276958942 CEST53595968.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:30:14.407341003 CEST6529653192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:14.459477901 CEST53652968.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:30:22.583833933 CEST6318353192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:22.640877008 CEST53631838.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:30:23.825819016 CEST6015153192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:23.874715090 CEST53601518.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:30:25.860424042 CEST5696953192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:25.912151098 CEST53569698.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:30:31.771228075 CEST5516153192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:31.829932928 CEST53551618.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:30:37.482243061 CEST5475753192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:37.548027039 CEST53547578.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:30:40.968626976 CEST4999253192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:41.017292023 CEST53499928.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:30:44.702049971 CEST6007553192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:44.762339115 CEST53600758.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:30:52.186739922 CEST5501653192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:52.243825912 CEST53550168.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:30:58.794589043 CEST6434553192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:30:58.856391907 CEST53643458.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:31:03.357353926 CEST5712853192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:31:03.414283037 CEST53571288.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:31:05.804575920 CEST5479153192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:31:05.862010002 CEST53547918.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:31:16.566315889 CEST5046353192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:31:16.626246929 CEST53504638.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:31:20.737910032 CEST5039453192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:31:20.786770105 CEST53503948.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:31:23.508275032 CEST5853053192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:31:23.567409039 CEST53585308.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:31:27.593275070 CEST5381353192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:31:27.654072046 CEST53538138.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:31:30.861699104 CEST6373253192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:31:30.918889046 CEST53637328.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:31:37.636682987 CEST5734453192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:31:37.696932077 CEST53573448.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:31:44.652456045 CEST5445053192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:31:44.709273100 CEST53544508.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:31:48.820518970 CEST5926153192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:31:48.888473988 CEST53592618.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:31:51.424906015 CEST5715153192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:31:51.481864929 CEST53571518.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:31:58.417778969 CEST5941353192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:31:58.466454029 CEST53594138.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:32:05.455231905 CEST6051653192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:32:05.514679909 CEST53605168.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:32:07.785151005 CEST5164953192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:32:07.835719109 CEST53516498.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:32:10.577003956 CEST6508653192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:32:10.651922941 CEST53650868.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:32:12.474344015 CEST5643253192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:32:12.542119026 CEST53564328.8.8.8192.168.2.5
                                                  Apr 12, 2021 08:32:19.553409100 CEST5292953192.168.2.58.8.8.8
                                                  Apr 12, 2021 08:32:19.610555887 CEST53529298.8.8.8192.168.2.5

                                                  DNS Queries

                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                  Apr 12, 2021 08:30:37.482243061 CEST192.168.2.58.8.8.80xcc94Standard query (0)uyeco.pwA (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:30:44.702049971 CEST192.168.2.58.8.8.80x98d0Standard query (0)uyeco.pwA (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:30:52.186739922 CEST192.168.2.58.8.8.80x42c3Standard query (0)uyeco.pwA (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:30:58.794589043 CEST192.168.2.58.8.8.80x9ad1Standard query (0)uyeco.pwA (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:05.804575920 CEST192.168.2.58.8.8.80xf8b7Standard query (0)uyeco.pwA (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:16.566315889 CEST192.168.2.58.8.8.80x276Standard query (0)uyeco.pwA (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:23.508275032 CEST192.168.2.58.8.8.80x534eStandard query (0)uyeco.pwA (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:30.861699104 CEST192.168.2.58.8.8.80x1f16Standard query (0)uyeco.pwA (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:37.636682987 CEST192.168.2.58.8.8.80x9350Standard query (0)uyeco.pwA (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:44.652456045 CEST192.168.2.58.8.8.80x93b6Standard query (0)uyeco.pwA (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:51.424906015 CEST192.168.2.58.8.8.80xaea6Standard query (0)uyeco.pwA (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:58.417778969 CEST192.168.2.58.8.8.80xdc36Standard query (0)uyeco.pwA (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:32:05.455231905 CEST192.168.2.58.8.8.80xb692Standard query (0)uyeco.pwA (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:32:12.474344015 CEST192.168.2.58.8.8.80x62acStandard query (0)uyeco.pwA (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:32:19.553409100 CEST192.168.2.58.8.8.80x7c97Standard query (0)uyeco.pwA (IP address)IN (0x0001)

                                                  DNS Answers

                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                  Apr 12, 2021 08:30:37.548027039 CEST8.8.8.8192.168.2.50xcc94No error (0)uyeco.pw172.94.38.41A (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:30:44.762339115 CEST8.8.8.8192.168.2.50x98d0No error (0)uyeco.pw172.94.38.41A (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:30:52.243825912 CEST8.8.8.8192.168.2.50x42c3No error (0)uyeco.pw172.94.38.41A (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:30:58.856391907 CEST8.8.8.8192.168.2.50x9ad1No error (0)uyeco.pw172.94.38.41A (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:05.862010002 CEST8.8.8.8192.168.2.50xf8b7No error (0)uyeco.pw172.94.38.41A (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:16.626246929 CEST8.8.8.8192.168.2.50x276No error (0)uyeco.pw172.94.38.41A (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:23.567409039 CEST8.8.8.8192.168.2.50x534eNo error (0)uyeco.pw172.94.38.41A (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:30.918889046 CEST8.8.8.8192.168.2.50x1f16No error (0)uyeco.pw172.94.38.41A (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:37.696932077 CEST8.8.8.8192.168.2.50x9350No error (0)uyeco.pw172.94.38.41A (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:44.709273100 CEST8.8.8.8192.168.2.50x93b6No error (0)uyeco.pw172.94.38.41A (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:51.481864929 CEST8.8.8.8192.168.2.50xaea6No error (0)uyeco.pw172.94.38.41A (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:31:58.466454029 CEST8.8.8.8192.168.2.50xdc36No error (0)uyeco.pw172.94.38.41A (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:32:05.514679909 CEST8.8.8.8192.168.2.50xb692No error (0)uyeco.pw172.94.38.41A (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:32:12.542119026 CEST8.8.8.8192.168.2.50x62acNo error (0)uyeco.pw172.94.38.41A (IP address)IN (0x0001)
                                                  Apr 12, 2021 08:32:19.610555887 CEST8.8.8.8192.168.2.50x7c97No error (0)uyeco.pw172.94.38.41A (IP address)IN (0x0001)

                                                  Code Manipulations

                                                  Statistics

                                                  Behavior

                                                  Click to jump to process

                                                  System Behavior

                                                  General

                                                  Start time:08:30:15
                                                  Start date:12/04/2021
                                                  Path:C:\Users\user\Desktop\7lrH3syQoO.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Users\user\Desktop\7lrH3syQoO.exe'
                                                  Imagebase:0x9b0000
                                                  File size:672256 bytes
                                                  MD5 hash:60C423711D537751BC90E037100AFF0C
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.273922733.0000000003E0D000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.273922733.0000000003E0D000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.273922733.0000000003E0D000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.273179000.0000000002D85000.00000004.00000001.sdmp, Author: Joe Security
                                                  Reputation:low

                                                  General

                                                  Start time:08:30:30
                                                  Start date:12/04/2021
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\YwKZCbS' /XML 'C:\Users\user\AppData\Local\Temp\tmp6FAA.tmp'
                                                  Imagebase:0x1360000
                                                  File size:185856 bytes
                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:08:30:30
                                                  Start date:12/04/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7ecfc0000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:08:30:31
                                                  Start date:12/04/2021
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  Imagebase:0x6f0000
                                                  File size:45152 bytes
                                                  MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.502485666.00000000029D1000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.508407731.0000000005B30000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.508407731.0000000005B30000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.506658685.0000000003A31000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.498272914.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.498272914.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.498272914.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.508737173.0000000005C60000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.508737173.0000000005C60000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.508737173.0000000005C60000.00000004.00000001.sdmp, Author: Joe Security
                                                  Reputation:high

                                                  Disassembly

                                                  Code Analysis

                                                  Reset < >