Loading ...

Play interactive tourEdit tour

Analysis Report Invoice No F1019855_PDF.vbs

Overview

General Information

Sample Name:Invoice No F1019855_PDF.vbs
Analysis ID:411334
MD5:fcf52f96d96c68788ffe13fcccd4c89c
SHA1:ca29113b7607ecb7d9a65d8285d7d36f367b1cd0
SHA256:fbc5a1e5f8a02c644cf207d40885c7973dc7e4809b97f676927da3e13e17ed1f
Tags:NanoCoreRATvbs
Infos:

Most interesting Screenshot:

Detection

Nanocore AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
VBScript performs obfuscated calls to suspicious functions
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Binary contains a suspicious time stamp
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates or modifies windows services
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • wscript.exe (PID: 6380 cmdline: C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Invoice No F1019855_PDF.vbs' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
    • file.exe (PID: 6588 cmdline: 'C:\Users\user\AppData\Local\Temp\file.exe' MD5: E6A6EB2982AB17BBB7083493805823BA)
      • schtasks.exe (PID: 7072 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\JkeJLChUI' /XML 'C:\Users\user\AppData\Local\Temp\tmpAD9.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 7104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • file.exe (PID: 7156 cmdline: {path} MD5: E6A6EB2982AB17BBB7083493805823BA)
    • name.exe (PID: 6612 cmdline: 'C:\Users\user\AppData\Local\Temp\name.exe' MD5: 43C4F163196FF02E7AA8C5040375FDA4)
      • schtasks.exe (PID: 7088 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LiydYED' /XML 'C:\Users\user\AppData\Local\Temp\tmpC12.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 7116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • name.exe (PID: 800 cmdline: {path} MD5: 43C4F163196FF02E7AA8C5040375FDA4)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "c687c38e-2b2d-4d96-b5eb-9a31ccba", "Group": "Sys", "Domain1": "sys2021.linkpc.net", "Domain2": "", "Port": 11940, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.255078777.00000000030F1000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000003.00000002.256966112.00000000040F9000.00000004.00000001.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      0000000B.00000002.477861276.0000000005590000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      0000000B.00000002.477861276.0000000005590000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      0000000B.00000002.476715022.0000000004087000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 21 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        11.2.name.exe.5950000.11.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xd9ad:$x1: NanoCore.ClientPluginHost
        • 0xd9da:$x2: IClientNetworkHost
        11.2.name.exe.5950000.11.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xd9ad:$x2: NanoCore.ClientPluginHost
        • 0xea88:$s4: PipeCreated
        • 0xd9c7:$s5: IClientLoggingHost
        11.2.name.exe.5950000.11.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          4.2.name.exe.47d8c38.1.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xe38d:$x1: NanoCore.ClientPluginHost
          • 0xe3ca:$x2: IClientNetworkHost
          • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          4.2.name.exe.47d8c38.1.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0xe105:$x1: NanoCore Client.exe
          • 0xe38d:$x2: NanoCore.ClientPluginHost
          • 0xf9c6:$s1: PluginCommand
          • 0xf9ba:$s2: FileCommand
          • 0x1086b:$s3: PipeExists
          • 0x16622:$s4: PipeCreated
          • 0xe3b7:$s5: IClientLoggingHost
          Click to see the 43 entries

          Sigma Overview

          AV Detection:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\name.exe, ProcessId: 800, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          E-Banking Fraud:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\name.exe, ProcessId: 800, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Stealing of Sensitive Information:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\name.exe, ProcessId: 800, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Remote Access Functionality:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\name.exe, ProcessId: 800, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 0000000B.00000002.476715022.0000000004087000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "c687c38e-2b2d-4d96-b5eb-9a31ccba", "Group": "Sys", "Domain1": "sys2021.linkpc.net", "Domain2": "", "Port": 11940, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
          Multi AV Scanner detection for submitted fileShow sources
          Source: Invoice No F1019855_PDF.vbsReversingLabs: Detection: 21%
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0000000B.00000002.476715022.0000000004087000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.468941603.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.254692678.0000000004551000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.478086503.0000000005950000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: name.exe PID: 6612, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: name.exe PID: 800, type: MEMORY
          Source: Yara matchFile source: 11.2.name.exe.5950000.11.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.47d8c38.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.408e43c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.4092a65.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.408e43c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.5950000.11.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.48f8090.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.5954629.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.47d8c38.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.4089606.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.46d79c8.2.raw.unpack, type: UNPACKEDPE
          Source: 11.2.name.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 11.2.name.exe.5950000.11.unpackAvira: Label: TR/NanoCore.fadte
          Source: 10.2.file.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
          Source: C:\Users\user\AppData\Local\Temp\name.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
          Source: Binary string: mscorrc.pdb source: name.exe, 00000004.00000002.261482145.0000000007200000.00000002.00000001.sdmp, name.exe, 0000000B.00000002.477662832.00000000054D0000.00000002.00000001.sdmp

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs:
          Source: Malware configuration extractorURLs: sys2021.linkpc.net
          Connects to many ports of the same IP (likely port scanning)Show sources
          Source: global trafficTCP traffic: 87.98.245.48 ports 10090,0,1,4,9,11940
          Source: global trafficTCP traffic: 192.168.2.3:49725 -> 87.98.245.48:11940
          Source: global trafficTCP traffic: 192.168.2.3:49736 -> 191.96.25.26:11940
          Source: Joe Sandbox ViewIP Address: 87.98.245.48 87.98.245.48
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
          Source: unknownDNS traffic detected: queries for: sys2021.linkpc.net
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: file.exe, 00000003.00000002.255141444.0000000003151000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: file.exe, 00000003.00000003.216324625.000000000608E000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: name.exe, 00000004.00000003.216797322.000000000597C000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
          Source: name.exe, 00000004.00000003.216797322.000000000597C000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comext
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, file.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: file.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com.TTF
          Source: name.exe, 00000004.00000003.220508852.0000000005977000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/
          Source: name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: file.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com9
          Source: file.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF6
          Source: file.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
          Source: file.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalic
          Source: file.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalso
          Source: file.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comessed
          Source: file.exe, 00000003.00000003.253543403.000000000608A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comion
          Source: file.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comlicd
          Source: file.exe, 00000003.00000003.253543403.000000000608A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.como
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: name.exe, 00000004.00000003.214233303.000000000598B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comx
          Source: name.exe, 00000004.00000003.214182404.000000000598B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comyp
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: file.exe, 00000003.00000002.262971462.0000000006170000.00000002.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: file.exe, 00000003.00000002.262971462.0000000006170000.00000002.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: file.exe, 00000003.00000003.215566337.000000000608E000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cntic
          Source: file.exe, 00000003.00000003.220028378.0000000006096000.00000004.00000001.sdmp, name.exe, 00000004.00000003.220508852.0000000005977000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: file.exe, 00000003.00000003.220798127.0000000006096000.00000004.00000001.sdmp, file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: file.exe, 00000003.00000003.220028378.0000000006096000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/w
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: file.exe, 00000003.00000003.217445274.0000000006083000.00000004.00000001.sdmp, name.exe, 00000004.00000003.218188499.0000000005978000.00000004.00000001.sdmp, name.exe, 00000004.00000003.217929078.0000000005977000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: name.exe, 00000004.00000003.217929078.0000000005977000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/&
          Source: file.exe, 00000003.00000003.217445274.0000000006083000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//sO
          Source: name.exe, 00000004.00000003.218188499.0000000005978000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/4
          Source: name.exe, 00000004.00000003.217929078.0000000005977000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/?
          Source: name.exe, 00000004.00000003.217929078.0000000005977000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/L
          Source: file.exe, 00000003.00000003.217445274.0000000006083000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ana
          Source: file.exe, 00000003.00000003.217445274.0000000006083000.00000004.00000001.sdmp, file.exe, 00000003.00000003.217797992.0000000006089000.00000004.00000001.sdmp, name.exe, 00000004.00000003.217929078.0000000005977000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
          Source: name.exe, 00000004.00000003.218188499.0000000005978000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/i
          Source: file.exe, 00000003.00000003.217797992.0000000006089000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/u
          Source: name.exe, 00000004.00000003.217929078.0000000005977000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/w
          Source: name.exe, 00000004.00000003.218188499.0000000005978000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/rge
          Source: file.exe, 00000003.00000003.217445274.0000000006083000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/u
          Source: name.exe, 00000004.00000003.217929078.0000000005977000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/x
          Source: name.exe, 00000004.00000003.218188499.0000000005978000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/~
          Source: name.exe, 00000004.00000003.214006989.000000000598B000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: name.exe, 00000004.00000003.214006989.000000000598B000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comw
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: file.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
          Source: file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: file.exe, 00000003.00000002.262971462.0000000006170000.00000002.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: file.exe, 0000000A.00000002.470394784.0000000001316000.00000004.00000020.sdmpString found in binary or memory: https://nexus.officeapps.live.com

          Key, Mouse, Clipboard, Microphone and Screen Capturing:

          barindex
          Yara detected AsyncRATShow sources
          Source: Yara matchFile source: 00000003.00000002.256966112.00000000040F9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.468822970.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 7156, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 6588, type: MEMORY
          Source: Yara matchFile source: 3.2.file.exe.421ac70.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.file.exe.4238890.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.file.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.file.exe.421ac70.3.raw.unpack, type: UNPACKEDPE
          Source: name.exe, 0000000B.00000002.476715022.0000000004087000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0000000B.00000002.476715022.0000000004087000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.468941603.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.254692678.0000000004551000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.478086503.0000000005950000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: name.exe PID: 6612, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: name.exe PID: 800, type: MEMORY
          Source: Yara matchFile source: 11.2.name.exe.5950000.11.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.47d8c38.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.408e43c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.4092a65.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.408e43c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.5950000.11.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.48f8090.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.5954629.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.47d8c38.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.4089606.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.46d79c8.2.raw.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 0000000B.00000002.477861276.0000000005590000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000B.00000002.476715022.0000000004087000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000B.00000002.468941603.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000B.00000002.468941603.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000004.00000002.254692678.0000000004551000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.254692678.0000000004551000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000B.00000002.478086503.0000000005950000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: name.exe PID: 6612, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: name.exe PID: 6612, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: name.exe PID: 800, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: name.exe PID: 800, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 11.2.name.exe.5950000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.name.exe.47d8c38.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.name.exe.47d8c38.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 11.2.name.exe.5590000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 11.2.name.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 11.2.name.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 11.2.name.exe.408e43c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 11.2.name.exe.4092a65.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 11.2.name.exe.408e43c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 11.2.name.exe.5950000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.name.exe.48f8090.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.name.exe.48f8090.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 11.2.name.exe.3051688.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 11.2.name.exe.5954629.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.name.exe.47d8c38.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.name.exe.47d8c38.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 11.2.name.exe.4089606.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 11.2.name.exe.4089606.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 4.2.name.exe.46d79c8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.name.exe.46d79c8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_059028A2 NtQuerySystemInformation,
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05902868 NtQuerySystemInformation,
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_0534116A NtQuerySystemInformation,
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_0534112F NtQuerySystemInformation,
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_00D76091
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_00D78A84
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0164D314
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772AF60
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772F630
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772CE88
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_07722C30
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_07726250
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772BA40
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_07727948
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_07722113
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_077251E0
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_07728828
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_07728767
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772AF50
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772BF08
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_07725658
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_07725649
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772BEF8
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_07724518
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_07724507
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772C591
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772C598
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772D350
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772A260
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772A252
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772AAB8
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772AAA9
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_07727938
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_077261F9
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_077231C0
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_077261A1
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772B9A8
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772D858
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772882A
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772A898
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 3_2_0772A888
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_00CD608D
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_00CD6281
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569E510
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569ADE8
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05692588
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05696998
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569C030
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05694B40
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05695B59
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05693BC8
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05695259
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_056936A0
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569A960
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569A160
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569A15E
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569A950
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569E924
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569B108
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05698108
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569E91C
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569ADD8
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569E9A7
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05698C48
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569C020
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05694008
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_056980F8
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569B0F8
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569E8FF
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569E8A3
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_056968B1
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05698880
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05698890
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569E756
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05699BC0
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569DFC0
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569E780
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569EE60
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569EE4F
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569E63E
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_056976C0
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05698AA8
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_056986A0
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_056976BA
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_056986B0
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569368F
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05694A98
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05698A98
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0745366F
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_07451700
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_07451BA9
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_07451BB8
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_07452E27
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 10_2_00D66091
          Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 10_2_00D68A84
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_0098608D
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_00986281
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_02AF7ABE
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_05219068
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_05218468
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_05213850
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_0521ACC8
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_052123A0
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_05212FA8
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_0521912F
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_05219910
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_0521306F
          Source: Invoice No F1019855_PDF.vbsInitial sample: Strings found which are bigger than 50
          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: sysmain.dll
          Source: 0000000B.00000002.477861276.0000000005590000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000B.00000002.477861276.0000000005590000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0000000B.00000002.476715022.0000000004087000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000B.00000002.468941603.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000B.00000002.468941603.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000004.00000002.254692678.0000000004551000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000004.00000002.254692678.0000000004551000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000B.00000002.478086503.0000000005950000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000B.00000002.478086503.0000000005950000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: Process Memory Space: name.exe PID: 6612, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: name.exe PID: 6612, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: name.exe PID: 800, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: name.exe PID: 800, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 11.2.name.exe.5950000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 11.2.name.exe.5950000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.name.exe.47d8c38.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.name.exe.47d8c38.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.name.exe.47d8c38.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 11.2.name.exe.5590000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 11.2.name.exe.5590000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 11.2.name.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 11.2.name.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 11.2.name.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 11.2.name.exe.408e43c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 11.2.name.exe.408e43c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 11.2.name.exe.4092a65.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 11.2.name.exe.4092a65.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 11.2.name.exe.408e43c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 11.2.name.exe.408e43c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 11.2.name.exe.5950000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 11.2.name.exe.5950000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.name.exe.48f8090.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.name.exe.48f8090.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 11.2.name.exe.3051688.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 11.2.name.exe.3051688.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 11.2.name.exe.5954629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 11.2.name.exe.5954629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.name.exe.47d8c38.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.name.exe.47d8c38.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 11.2.name.exe.4089606.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 11.2.name.exe.4089606.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 11.2.name.exe.4089606.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 4.2.name.exe.46d79c8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.name.exe.46d79c8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: file.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: JkeJLChUI.exe.3.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: LiydYED.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal100.troj.evad.winVBS@15/9@24/2
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_059027D2 AdjustTokenPrivileges,
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0590279B AdjustTokenPrivileges,
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_05340F2A AdjustTokenPrivileges,
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_05340EF3 AdjustTokenPrivileges,
          Source: C:\Users\user\AppData\Local\Temp\file.exeFile created: C:\Users\user\AppData\Roaming\JkeJLChUI.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\file.exeMutant created: \Sessions\1\BaseNamedObjects\871-085a33d91457
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7104:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7116:120:WilError_01
          Source: C:\Users\user\AppData\Local\Temp\file.exeMutant created: \Sessions\1\BaseNamedObjects\Global\RefreshRA_Mutex_Lib
          Source: C:\Users\user\AppData\Local\Temp\name.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Users\user\AppData\Local\Temp\name.exeMutant created: \Sessions\1\BaseNamedObjects\lsPvaxhQEBvPAUaKmBBEq
          Source: C:\Users\user\AppData\Local\Temp\file.exeMutant created: \Sessions\1\BaseNamedObjects\RZiGID
          Source: C:\Users\user\AppData\Local\Temp\name.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{c687c38e-2b2d-4d96-b5eb-9a31ccba603d}
          Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\file.exeJump to behavior
          Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Invoice No F1019855_PDF.vbs'
          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Local\Temp\name.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Local\Temp\name.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Users\user\AppData\Local\Temp\name.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Local\Temp\name.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Local\Temp\name.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Users\user\AppData\Local\Temp\name.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Users\user\AppData\Local\Temp\file.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\file.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Invoice No F1019855_PDF.vbsReversingLabs: Detection: 21%
          Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Invoice No F1019855_PDF.vbs'
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\file.exe 'C:\Users\user\AppData\Local\Temp\file.exe'
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\name.exe 'C:\Users\user\AppData\Local\Temp\name.exe'
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\JkeJLChUI' /XML 'C:\Users\user\AppData\Local\Temp\tmpAD9.tmp'
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LiydYED' /XML 'C:\Users\user\AppData\Local\Temp\tmpC12.tmp'
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess created: C:\Users\user\AppData\Local\Temp\file.exe {path}
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess created: C:\Users\user\AppData\Local\Temp\name.exe {path}
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\file.exe 'C:\Users\user\AppData\Local\Temp\file.exe'
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\name.exe 'C:\Users\user\AppData\Local\Temp\name.exe'
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\JkeJLChUI' /XML 'C:\Users\user\AppData\Local\Temp\tmpAD9.tmp'
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess created: C:\Users\user\AppData\Local\Temp\file.exe {path}
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LiydYED' /XML 'C:\Users\user\AppData\Local\Temp\tmpC12.tmp'
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess created: C:\Users\user\AppData\Local\Temp\name.exe {path}
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32
          Source: C:\Users\user\AppData\Local\Temp\file.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: Invoice No F1019855_PDF.vbsStatic file information: File size 2072856 > 1048576
          Source: C:\Users\user\AppData\Local\Temp\name.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
          Source: Binary string: mscorrc.pdb source: name.exe, 00000004.00000002.261482145.0000000007200000.00000002.00000001.sdmp, name.exe, 0000000B.00000002.477662832.00000000054D0000.00000002.00000001.sdmp

          Data Obfuscation:

          barindex
          VBScript performs obfuscated calls to suspicious functionsShow sources
          Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("C:\Users\user\AppData\Local\Temp\file.exe");IFileSystem3.GetSpecialFolder("2");IFolder.Path();IFileSystem3.GetSpecialFolder("2");IFolder.Path();IXMLDOMNode._00000029("tmp");IXMLDOMElement.dataType("bin.base64");IXMLDOMElement.text("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDADJHWrcAAAAAAAAAAOAAAgELATAAALIKAAAIAAAAAAAAVtE");IXMLDOMElement.nodeTypedValue();_Stream.Type("1");_Stream.Open();_Stream.Write("Unsupported parameter type 00002011");_Stream.SaveToFile("C:\Users\user\AppData\Local\Temp\file.exe", "2");IXMLDOMNode._00000029("tmp");IXMLDOMElement.dataType("bin.base64");IXMLDOMElement.text("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAOnJY+kAAAAAAAAAAOAAAgELATAAAPALAAAIAAAAAAAAOg4");IXMLDOMElement.nodeTypedValue();_Stream.Type("1");_Stream.Open();_Stream.Write("Unsupported parameter type 00002011");_Stream.SaveToFile("C:\Users\user\AppData\Local\Temp\name.exe", "2");IWshShell3.Run("C:\Users\user\AppData\Local\Temp\file.exe");IWshShell3.Run("C:\Users\user\AppData\Local\Temp\name.exe")
          .NET source code contains potential unpackerShow sources
          Source: JkeJLChUI.exe.3.dr, MainForm.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 3.2.file.exe.d70000.0.unpack, MainForm.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 3.0.file.exe.d70000.0.unpack, MainForm.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.2.name.exe.cd0000.0.unpack, MainForm.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.0.name.exe.cd0000.0.unpack, MainForm.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 10.2.file.exe.d60000.1.unpack, MainForm.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: file.exe.0.drStatic PE information: 0xB75A4732 [Fri Jun 24 13:16:34 2067 UTC]
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_016B0DA8 push esi; ret
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_016B0D60 push esi; ret
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_016B0DF0 push esi; ret
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_016B0E90 push esi; ret
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_016E7DC1 push 64016E86h; ret
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_056985F8 pushfd ; retf
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05698588 pushad ; retf
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_0569DA2A push E9FFFFFFh; iretd
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_02AF9D30 pushad ; retf
          Source: initial sampleStatic PE information: section name: .text entropy: 7.21530395794
          Source: initial sampleStatic PE information: section name: .text entropy: 7.21530395794
          Source: initial sampleStatic PE information: section name: .text entropy: 7.33039162712
          Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\file.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\name.exeFile created: C:\Users\user\AppData\Roaming\LiydYED.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\file.exeFile created: C:\Users\user\AppData\Roaming\JkeJLChUI.exeJump to dropped file
          Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\name.exeJump to dropped file

          Boot Survival:

          barindex
          Yara detected AsyncRATShow sources
          Source: Yara matchFile source: 00000003.00000002.256966112.00000000040F9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.468822970.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 7156, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 6588, type: MEMORY
          Source: Yara matchFile source: 3.2.file.exe.421ac70.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.file.exe.4238890.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.file.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.file.exe.421ac70.3.raw.unpack, type: UNPACKEDPE
          Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\JkeJLChUI' /XML 'C:\Users\user\AppData\Local\Temp\tmpAD9.tmp'
          Source: C:\Users\user\AppData\Local\Temp\file.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MSDTC Bridge 3.0.0.0\LinkageJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\file.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\.NET Memory Cache 4.0\LinkageJump to behavior

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Users\user\AppData\Local\Temp\name.exeFile opened: C:\Users\user\AppData\Local\Temp\name.exe:Zone.Identifier read attributes | delete
          Source: C:\Windows\System32\wscript.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000003.00000002.255078777.00000000030F1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: name.exe PID: 6612, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 6588, type: MEMORY
          Source: Yara matchFile source: 3.2.file.exe.311576c.1.raw.unpack, type: UNPACKEDPE
          Yara detected AsyncRATShow sources
          Source: Yara matchFile source: 00000003.00000002.256966112.00000000040F9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.468822970.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 7156, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 6588, type: MEMORY
          Source: Yara matchFile source: 3.2.file.exe.421ac70.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.file.exe.4238890.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.file.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.file.exe.421ac70.3.raw.unpack, type: UNPACKEDPE
          Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)Show sources
          Source: C:\Users\user\AppData\Local\Temp\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\AppData\Local\Temp\name.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: file.exe, 00000003.00000002.255078777.00000000030F1000.00000004.00000001.sdmp, name.exe, 00000004.00000002.251572904.0000000003551000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: file.exe, 00000003.00000002.255078777.00000000030F1000.00000004.00000001.sdmp, name.exe, 00000004.00000002.251572904.0000000003551000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: file.exe, 00000003.00000002.256966112.00000000040F9000.00000004.00000001.sdmp, file.exe, 0000000A.00000002.468822970.0000000000402000.00000040.00000001.sdmpBinary or memory string: SBIEDLL.DLLME: CHAT
          Source: C:\Users\user\AppData\Local\Temp\name.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier
          Source: C:\Users\user\AppData\Local\Temp\name.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
          Source: C:\Users\user\AppData\Local\Temp\name.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
          Source: C:\Users\user\AppData\Local\Temp\name.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\AppData\Local\Temp\name.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum name: 0
          Source: C:\Users\user\AppData\Local\Temp\name.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
          Source: C:\Users\user\AppData\Local\Temp\file.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\name.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\name.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
          Source: C:\Users\user\AppData\Local\Temp\name.exeWindow / User API: foregroundWindowGot 835
          Source: C:\Users\user\AppData\Local\Temp\file.exe TID: 6592Thread sleep time: -31500s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\file.exe TID: 2540Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\name.exe TID: 6616Thread sleep time: -31500s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\name.exe TID: 6648Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\name.exe TID: 5060Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\name.exe TID: 5060Thread sleep count: 145 > 30
          Source: C:\Users\user\AppData\Local\Temp\name.exe TID: 5060Thread sleep count: 221 > 30
          Source: C:\Users\user\AppData\Local\Temp\name.exe TID: 3512Thread sleep count: 256 > 30
          Source: C:\Users\user\AppData\Local\Temp\name.exe TID: 5060Thread sleep count: 31 > 30
          Source: C:\Users\user\AppData\Local\Temp\name.exe TID: 5052Thread sleep time: -280000s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\AppData\Local\Temp\file.exeLast function: Thread delayed
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_05340BB6 GetSystemInfo,
          Source: C:\Users\user\AppData\Local\Temp\file.exeThread delayed: delay time: 31500
          Source: C:\Users\user\AppData\Local\Temp\file.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\name.exeThread delayed: delay time: 31500
          Source: C:\Users\user\AppData\Local\Temp\name.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\name.exeThread delayed: delay time: 922337203685477
          Source: file.exe, 00000003.00000002.267489782.0000000007A75000.00000004.00000001.sdmpBinary or memory string: VMware
          Source: file.exe, 0000000A.00000002.478323330.0000000005947000.00000004.00000001.sdmpBinary or memory string: 8258RemoteFX Synth3D VSC VM Transport Channel8260Number of space available signals received8262Number of space available signals received per second8264Number of data available signals received8266Number of data available signals received per second8268Number of space available signals sent8270Number of space available signals sent per second8272Number of data available signals sent8274Number of data available signals sent per second8276Number of data available event was reset8278Number of data available event was reset per second8280Number of space available event was reset8282Number of space available event was reset per second8244RemoteFX Synth3D VSC VM Device8246Number of created VMT channels8248Number of waiting VMT channels8250Number of connected VMT channels8252Number of disconnected VMT channels8254Total number of created VMT channels8256Number of RDVGM restarted notifications7320WorkflowServiceHost 4.0.0.07322Workflows Created7324Workflows Created Per Second7326Workflows Executing7328Workflows Completed7330Workflows Completed Per Second7332Workflows Aborted7334Workflows Aborted Per Second7336Workflows In Memory7338Workflows Persisted7340Workflows Persisted Per Second7342Workflows Terminated7344Workflows Terminated Per Second7346Workflows Loaded7348Workflows Loaded Per Second7350Workflows Unloaded7352Workflows Unloaded Per Second7354Workflows Suspended7356Workflows Suspended Per Second7358Workflows Idle Per Second7360Average Workflow Load Time7362Average Workflow Load Time Base7364Average Workflow Persist Time7366Average Workflow Persist Time Base8154Terminal Services8156Active Sessions8158Inactive Sessions8160Total Sessions5200Hyper-V Hypervisor Logical Processor5202Global Time5204Total Run Time5206Hypervisor Run Time5208Hardware Interrupts/sec5210Context Switches/sec5212Inter-Processor Interrupts/sec5214Scheduler Interrupts/sec5216Timer Interrupts/secy&
          Source: file.exe, 0000000A.00000002.473021861.0000000003191000.00000004.00000001.sdmpBinary or memory string: l!Hyper-V Virtual Machine Bus Pipes
          Source: file.exe, 0000000A.00000002.477862631.0000000005646000.00000004.00000001.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration ServiceA
          Source: file.exe, 0000000A.00000003.283195559.0000000005662000.00000004.00000001.sdmpBinary or memory string: Hyper-V odyhnxjxsoexvdl Bus'
          Source: name.exe, 00000004.00000002.251572904.0000000003551000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: name.exe, 00000004.00000002.251572904.0000000003551000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: name.exe, 00000004.00000002.251572904.0000000003551000.00000004.00000001.sdmpBinary or memory string: XrA"SOFTWARE\VMware, Inc.\VMware Tools
          Source: name.exe, 00000004.00000002.251572904.0000000003551000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: wscript.exe, 00000000.00000002.217300558.0000023C9F5B0000.00000002.00000001.sdmp, file.exe, 0000000A.00000002.478778610.0000000005FD0000.00000002.00000001.sdmp, name.exe, 0000000B.00000002.478683812.0000000006380000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: file.exe, 00000003.00000002.267489782.0000000007A75000.00000004.00000001.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareMZF7_W99Win32_VideoControllerAU6HH_1NVideoController120060621000000.000000-00039494928display.infMSBDAE93F5W6VPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsDGO2XXF2l
          Source: name.exe, 00000004.00000002.251572904.0000000003551000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: file.exe, 0000000A.00000002.477862631.0000000005646000.00000004.00000001.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service/
          Source: file.exe, 0000000A.00000002.477926995.0000000005665000.00000004.00000001.sdmpBinary or memory string: Hyper-V odyhnxjxsoexvdl Bus?
          Source: file.exe, 0000000A.00000002.477862631.0000000005646000.00000004.00000001.sdmpBinary or memory string: VHyper-V Virtual Machine Bus Provider PipesW
          Source: file.exe, 0000000A.00000003.282965781.0000000001366000.00000004.00000001.sdmpBinary or memory string: terrupts/sec5216Timer Interrupts/sec5218Inter-Processor Interrupts Sent/sec5220Processor Halts/sec5222Monitor Transition Cost5224Context Switch Time5226C1 Transitions/sec5228% C1 Time5230C2 Transitions/sec5232% C2 Time5234C3 Transitions/sec5236% C3 Time5238Frequency5240% of Max Frequency5242Parking Status5244Processor State Flags5246Root Vp Index5248Idle Sequence Number5250Global TSC Count5252Active TSC Count5254Idle Accumulation5256Reference Cycle Count 05258Actual Cycle Count 05260Reference Cycle Count 15262Actual Cycle Count 15264Proximity Domain Id5266Posted Interrupt Notifications/sec5268Guest Run Time5270Idle Time5272% Total Run Time5274% Hypervisor Run Time5276% Guest Run Time5278% Idle Time5280Total Interrupts/sec5182Hyper-V Hypervisor5184Logical Processors5186Partitions5188Total Pages5190Virtual Processors5192Monitored Notifications5194Modern Standby Entries5196Platform Idle Transitions5198HypervisorStartupCost5282Hyper-V Hypervisor Root Partition5284Virtual Processors5286Virtual TLB Pages5288Address Spaces5290Deposited Pages5292GPA Pages5294GPA Space Modifications/sec5296Virtual TLB Flush Entires/sec5298Recommended Virtual TLB Size53004K GPA pages53022M GPA pages53041G GPA pages5306512G GPA pages53084K device pages53102M device pages53121G device pages5314512G device pages5316Attached Devices5318Device Interrupt Mappings5320I/O TLB Flushes/sec5322I/O TLB Flush Cost5324Device Interrupt Errors5326Device DMA Errors5328Device Interrupt Throttle Events5330Skipped Timer Ticks5332Partition Id5334Nested TLB Size5336Recommended Nested TLB Size5338Nested TLB Free List Size5340Nested TLB Trimmed Pages/sec5342I/O TLB Flushes Base5344Hyper-V Hypervisor Root Virtual Processor5346Total Run Time5348Hypervisor Run Time5350Remote Node Run Time5352Normalized Run Time5354Hypercalls/sec5356Hypercalls Cost5358Page Invalidations/sec5360Page Invalidations Cost5362Control Register Accesses/sec5364Control Register Accesses Cost5366IO Instructions/sec5368IO Instructions Cost5370HLT Instructions/sec5372HLT Instructions Cost5374MWAIT Instructions/sec5376MWAIT Instructions Cost5378CPUID Instructions/sec5380CPUID Instructions Cost5382MSR Accesses/sec5384MSR Accesses Cost5386Other Intercepts/sec5388Other Intercepts Cost5390External Interrupts/sec5392External Interrupts Cost5394Pending Interrupts/sec5396Pending Interrupts Cost5398Emulated Instructions/sec5400Emulated Instructions Cost5402Debug Register Accesses/sec5404Debug Register Accesses Cost5406Page Fault Intercepts/sec5408Page Fault Intercepts Cost5410Guest Page Table Maps/sec5412Large Page TLB Fills/sec5414Small Page TLB Fills/sec5416Reflected Guest Page Faults/sec5418APIC MMIO Accesses/sec5420IO Intercept Messages/sec5422Memory Intercept Messages/sec5424APIC EOI Accesses/sec5426Other Messages/sec5428Page Table Allocations/sec5430Logical Processor Migrations/sec5432Address Space Evictions/sec5434Address Space Switches/sec5436Address Domain Flushes/sec5438Address Space Flushes/sec5440Global GVA Range Flushes/sec5
          Source: name.exe, 00000004.00000002.251572904.0000000003551000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
          Source: file.exe, 0000000A.00000002.468822970.0000000000402000.00000040.00000001.sdmpBinary or memory string: vmware
          Source: file.exe, 00000003.00000002.255078777.00000000030F1000.00000004.00000001.sdmpBinary or memory string: l%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: name.exe, 00000004.00000002.251572904.0000000003551000.00000004.00000001.sdmpBinary or memory string: Xr&%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: file.exe, 0000000A.00000003.283195559.0000000005662000.00000004.00000001.sdmpBinary or memory string: Hyper-V odyhnxjxsoexvdl Bus Pipes)
          Source: file.exe, 0000000A.00000002.473021861.0000000003191000.00000004.00000001.sdmpBinary or memory string: l)Hyper-V Hypervisor Root Virtual Processor
          Source: file.exe, 0000000A.00000002.477862631.0000000005646000.00000004.00000001.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor
          Source: file.exe, 0000000A.00000003.283312609.000000000135C000.00000004.00000001.sdmpBinary or memory string: RemoteFX Synth3D VSC VM Transport Channel8260Number of space available signals received8262Number of space available signals received per second8264Number of data available signals received8266Number of data available signals received per second8268Number of space available signals sent8270Number of space available signals sent per second8272Number of data available signals sent8274Number of data available signals sent per second8276Number of data available event was reset8278Number of data available event was reset per second8280Number of space available event was reset8282Number of space available event was reset per second8244RemoteFX Synth3D VSC VM Device8246Number of created VMT channels8248Number of waiting VMT channels8250Number of connected VMT channels8252Number of disconnected VMT channels8254Total number of created VMT channels8256Number of RDVGM restarted notifications7320WorkflowServiceHost 4.0.0.07322Workflows Created7324Workflows Created Per Second7326Workflows Executing7328Workflows Completed7330Workflows Completed Per Second7332Workflows Aborted7334Workflows Aborted Per Second7336Workflows In Memory7338Workflows Persisted7340Workflows Persisted Per Second7342Workflows Terminated7344Workflows Terminated Per Second7346Workflows Loaded7348Workflows Loaded Per Second7350Workflows Unloaded7352Workflows Unloaded Per Second7354Workflows Suspended7356Workflows Suspended Per Second7358Workflows Idle Per Second7360Average Workflow Load Time7362Average Workflow Load Time Base7364Average Workflow Persist Time7366Average Workflow Persist Time Base8154Terminal Services8156Active Sessions8158Inactive Sessions8160Total Sessions5200Hyper-V Hypervisor Logical Processor5202Global Time5204Total Run Time5206Hypervisor Run Time5208Hardware Interrupts/sec5210Context Switches/sec5212Inter-Processor Interrupts/sec5214Scheduler In
          Source: file.exe, 0000000A.00000002.478270567.0000000005896000.00000004.00000001.sdmpBinary or memory string: AlDHyper-V Virtual Machine Bus PipesU
          Source: file.exe, 00000003.00000002.255078777.00000000030F1000.00000004.00000001.sdmpBinary or memory string: l"SOFTWARE\VMware, Inc.\VMware Tools
          Source: name.exe, 00000004.00000002.251572904.0000000003551000.00000004.00000001.sdmpBinary or memory string: Xr87HKEY_LOCAL_MACHINE\SOFTWARE\VMware, Inc.\VMware Tools\.
          Source: wscript.exe, 00000000.00000002.217300558.0000023C9F5B0000.00000002.00000001.sdmp, file.exe, 0000000A.00000002.478778610.0000000005FD0000.00000002.00000001.sdmp, name.exe, 0000000B.00000002.478683812.0000000006380000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: wscript.exe, 00000000.00000002.217300558.0000023C9F5B0000.00000002.00000001.sdmp, file.exe, 0000000A.00000002.478778610.0000000005FD0000.00000002.00000001.sdmp, name.exe, 0000000B.00000002.478683812.0000000006380000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: file.exe, 0000000A.00000002.473021861.0000000003191000.00000004.00000001.sdmpBinary or memory string: l$Hyper-V Hypervisor Logical Processor
          Source: file.exe, 0000000A.00000002.470394784.0000000001316000.00000004.00000020.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
          Source: file.exe, 0000000A.00000002.478270567.0000000005896000.00000004.00000001.sdmpBinary or memory string: sWDHyper-V Hypervisor Root Partition
          Source: file.exe, 0000000A.00000002.470394784.0000000001316000.00000004.00000020.sdmpBinary or memory string: &Hyper-V Hypervisor
          Source: file.exe, 0000000A.00000002.477862631.0000000005646000.00000004.00000001.sdmpBinary or memory string: Hyper-V odyhnxjxsoexvdl Bus Provider Pipes
          Source: name.exe, 00000004.00000002.251572904.0000000003551000.00000004.00000001.sdmpBinary or memory string: Xr#"SOFTWARE\VMware, Inc.\VMware Tools
          Source: file.exe, 0000000A.00000002.473021861.0000000003191000.00000004.00000001.sdmpBinary or memory string: l!Hyper-V Hypervisor Root Partition
          Source: file.exe, 0000000A.00000002.473021861.0000000003191000.00000004.00000001.sdmpBinary or memory string: l*Hyper-V Virtual Machine Bus Provider Pipes
          Source: file.exe, 0000000A.00000003.283296035.0000000005948000.00000004.00000001.sdmpBinary or memory string: C VM Transport Channel8260Number of space available signals received8262Number of space available signals received per second8264Number of data available signals received8266Number of data available signals received per second8268Number of space available signals sent8270Number of space available signals sent per second8272Number of data available signals sent8274Number of data available signals sent per second8276Number of data available event was reset8278Number of data available event was reset per second8280Number of space available event was reset8282Number of space available event was reset per second8244RemoteFX Synth3D VSC VM Device8246Number of created VMT channels8248Number of waiting VMT channels8250Number of connected VMT channels8252Number of disconnected VMT channels8254Total number of created VMT channels8256Number of RDVGM restarted notifications7320WorkflowServiceHost 4.0.0.07322Workflows Created7324Workflows Created Per Second7326Workflows Executing7328Workflows Completed7330Workflows Completed Per Second7332Workflows Aborted7334Workflows Aborted Per Second7336Workflows In Memory7338Workflows Persisted7340Workflows Persisted Per Second7342Workflows Terminated7344Workflows Terminated Per Second7346Workflows Loaded7348Workflows Loaded Per Second7350Workflows Unloaded7352Workflows Unloaded Per Second7354Workflows Suspended7356Workflows Suspended Per Second7358Workflows Idle Per Second7360Average Workflow Load Time7362Average Workflow Load Time Base7364Average Workflow Persist Time7366Average Workflow Persist Time Base8154Terminal Services8156Active Sessions8158Inactive Sessions8160Total Sessions5200Hyper-V Hypervisor Logical Processor5202Global Time5204Total Run Time5206Hypervisor Run Time5208Hardware Interrupts/sec5210Context Switches/sec5212Inter-Processor Interrupts/sec5214Scheduler Interrupts/sec5216Timer Interrupts/secy&
          Source: wscript.exe, 00000000.00000003.213260478.0000023C9D1E3000.00000004.00000001.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
          Source: name.exe, 00000004.00000002.251572904.0000000003551000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: name.exe, 00000004.00000002.251572904.0000000003551000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: file.exe, 0000000A.00000002.470394784.0000000001316000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: file.exe, 0000000A.00000002.473021861.0000000003191000.00000004.00000001.sdmpBinary or memory string: l*Hyper-V Dynamic Memory Integration Service
          Source: name.exe, 00000004.00000002.251572904.0000000003551000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: wscript.exe, 00000000.00000002.215459586.0000023C9EE70000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\
          Source: wscript.exe, 00000000.00000002.217300558.0000023C9F5B0000.00000002.00000001.sdmp, file.exe, 0000000A.00000002.478778610.0000000005FD0000.00000002.00000001.sdmp, name.exe, 0000000B.00000002.478683812.0000000006380000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: name.exe, 00000004.00000002.251572904.0000000003551000.00000004.00000001.sdmpBinary or memory string: Xr#"SOFTWARE\VMware, Inc.\VMware ToolsH
          Source: file.exe, 0000000A.00000002.473021861.0000000003191000.00000004.00000001.sdmpBinary or memory string: Hyper-V Hypervisor
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Local\Temp\file.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Benign windows process drops PE filesShow sources
          Source: C:\Windows\System32\wscript.exeFile created: file.exe.0.drJump to dropped file
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\AppData\Local\Temp\name.exeMemory written: C:\Users\user\AppData\Local\Temp\name.exe base: 400000 value starts with: 4D5A
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\file.exe 'C:\Users\user\AppData\Local\Temp\file.exe'
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\name.exe 'C:\Users\user\AppData\Local\Temp\name.exe'
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\JkeJLChUI' /XML 'C:\Users\user\AppData\Local\Temp\tmpAD9.tmp'
          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess created: C:\Users\user\AppData\Local\Temp\file.exe {path}
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LiydYED' /XML 'C:\Users\user\AppData\Local\Temp\tmpC12.tmp'
          Source: C:\Users\user\AppData\Local\Temp\name.exeProcess created: C:\Users\user\AppData\Local\Temp\name.exe {path}
          Source: file.exe, 0000000A.00000002.472816675.0000000001C80000.00000002.00000001.sdmp, name.exe, 0000000B.00000002.474486275.00000000030CD000.00000004.00000001.sdmpBinary or memory string: Program Manager
          Source: file.exe, 0000000A.00000002.472816675.0000000001C80000.00000002.00000001.sdmp, name.exe, 0000000B.00000002.472036052.00000000016E0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: file.exe, 0000000A.00000002.472816675.0000000001C80000.00000002.00000001.sdmp, name.exe, 0000000B.00000002.472036052.00000000016E0000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: name.exe, 0000000B.00000002.474486275.00000000030CD000.00000004.00000001.sdmpBinary or memory string: Program Managerp
          Source: file.exe, 0000000A.00000002.472816675.0000000001C80000.00000002.00000001.sdmp, name.exe, 0000000B.00000002.472036052.00000000016E0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\file.exe VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\file.exe VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 4_2_05901382 GetUserNameA,
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Lowering of HIPS / PFW / Operating System Security Settings:

          barindex
          Yara detected AsyncRATShow sources
          Source: Yara matchFile source: 00000003.00000002.256966112.00000000040F9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.468822970.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 7156, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 6588, type: MEMORY
          Source: Yara matchFile source: 3.2.file.exe.421ac70.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.file.exe.4238890.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.file.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.file.exe.421ac70.3.raw.unpack, type: UNPACKEDPE

          Stealing of Sensitive Information:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0000000B.00000002.476715022.0000000004087000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.468941603.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.254692678.0000000004551000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.478086503.0000000005950000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: name.exe PID: 6612, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: name.exe PID: 800, type: MEMORY
          Source: Yara matchFile source: 11.2.name.exe.5950000.11.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.47d8c38.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.408e43c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.4092a65.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.408e43c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.5950000.11.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.48f8090.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.5954629.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.47d8c38.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.4089606.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.46d79c8.2.raw.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Detected Nanocore RatShow sources
          Source: name.exe, 00000004.00000002.254692678.0000000004551000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: name.exe, 0000000B.00000002.477861276.0000000005590000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: name.exe, 0000000B.00000002.477861276.0000000005590000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0000000B.00000002.476715022.0000000004087000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.468941603.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.254692678.0000000004551000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.478086503.0000000005950000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: name.exe PID: 6612, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: name.exe PID: 800, type: MEMORY
          Source: Yara matchFile source: 11.2.name.exe.5950000.11.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.47d8c38.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.408e43c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.4092a65.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.408e43c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.5950000.11.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.48f8090.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.5954629.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.47d8c38.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.name.exe.4089606.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.name.exe.46d79c8.2.raw.unpack, type: UNPACKEDPE
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_0534247A bind,
          Source: C:\Users\user\AppData\Local\Temp\name.exeCode function: 11_2_05342428 bind,

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management Instrumentation1DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools1Input Capture11Account Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScripting121Windows Service2Access Token Manipulation1Scripting121LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsExploitation for Client Execution1Scheduled Task/Job2Windows Service2Obfuscated Files or Information13Security Account ManagerSystem Information Discovery13SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsScheduled Task/Job2Logon Script (Mac)Process Injection112Software Packing13NTDSQuery Registry1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptScheduled Task/Job2Timestomp1LSA SecretsSecurity Software Discovery211SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDLL Side-Loading1Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsMasquerading1DCSyncVirtualization/Sandbox Evasion131Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobVirtualization/Sandbox Evasion131Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Access Token Manipulation1/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Process Injection112Network SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
          Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronHidden Files and Directories1Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 411334 Sample: Invoice No F1019855_PDF.vbs Startdate: 11/05/2021 Architecture: WINDOWS Score: 100 46 sys2021.linkpc.net 2->46 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 Multi AV Scanner detection for submitted file 2->56 58 9 other signatures 2->58 9 wscript.exe 3 2->9         started        signatures3 process4 file5 36 C:\Users\user\AppData\Local\Temp\name.exe, PE32 9->36 dropped 38 C:\Users\user\AppData\Local\Temp\file.exe, PE32 9->38 dropped 62 Benign windows process drops PE files 9->62 64 VBScript performs obfuscated calls to suspicious functions 9->64 13 name.exe 6 9->13         started        17 file.exe 6 9->17         started        signatures6 process7 file8 40 C:\Users\user\AppData\Roaming\LiydYED.exe, PE32 13->40 dropped 66 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 13->66 68 Injects a PE file into a foreign processes 13->68 19 name.exe 8 13->19         started        24 schtasks.exe 1 13->24         started        42 C:\Users\user\AppData\Local\Temp\tmpAD9.tmp, XML 17->42 dropped 44 C:\Users\user\AppData\Roaming\JkeJLChUI.exe, PE32 17->44 dropped 70 Uses schtasks.exe or at.exe to add and modify task schedules 17->70 26 file.exe 11 2 17->26         started        28 schtasks.exe 1 17->28         started        signatures9 process10 dnsIp11 48 sys2021.linkpc.net 87.98.245.48, 10090, 11940, 49725 OVHFR France 19->48 50 191.96.25.26, 11940, 49736, 49739 AS40676US Chile 19->50 34 C:\Users\user\AppData\Roaming\...\run.dat, data 19->34 dropped 60 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->60 30 conhost.exe 24->30         started        32 conhost.exe 28->32         started        file12 signatures13 process14

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          Invoice No F1019855_PDF.vbs21%ReversingLabsScript-WScript.Trojan.Heuristic

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          11.2.name.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          11.2.name.exe.5950000.11.unpack100%AviraTR/NanoCore.fadteDownload File
          10.2.file.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.fontbureau.comessed0%URL Reputationsafe
          http://www.fontbureau.comessed0%URL Reputationsafe
          http://www.fontbureau.comessed0%URL Reputationsafe
          http://www.fontbureau.comessed0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/~0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/~0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/~0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/~0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.fontbureau.comF60%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/rge0%Avira URL Cloudsafe
          http://www.fontbureau.comlicd0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/40%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/40%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/40%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/40%URL Reputationsafe
          http://www.fonts.comyp0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/w0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/i0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/ana0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/ana0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/ana0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.carterandcone.comext0%Avira URL Cloudsafe
          http://www.fontbureau.com90%Avira URL Cloudsafe
          http://www.fontbureau.comalso0%Avira URL Cloudsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/&0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/&0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/&0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.de0%URL Reputationsafe
          http://www.urwpp.de0%URL Reputationsafe
          http://www.urwpp.de0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.fontbureau.com.TTF0%URL Reputationsafe
          http://www.fontbureau.com.TTF0%URL Reputationsafe
          http://www.fontbureau.com.TTF0%URL Reputationsafe
          http://www.fonts.comx0%URL Reputationsafe
          http://www.fonts.comx0%URL Reputationsafe
          http://www.fonts.comx0%URL Reputationsafe
          http://www.galapagosdesign.com/0%URL Reputationsafe
          http://www.galapagosdesign.com/0%URL Reputationsafe
          http://www.galapagosdesign.com/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp//sO0%Avira URL Cloudsafe
          http://www.sajatypeworks.comw0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/L0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/L0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/L0%URL Reputationsafe
          http://www.fontbureau.comion0%URL Reputationsafe
          http://www.fontbureau.comion0%URL Reputationsafe
          http://www.fontbureau.comion0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/u0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          sys2021.linkpc.net
          87.98.245.48
          truefalse
            high

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            true
            • Avira URL Cloud: safe
            low
            sys2021.linkpc.netfalse
              high

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://www.fontbureau.com/designersGfile.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designers/?file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bThefile.exe, 00000003.00000002.262971462.0000000006170000.00000002.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                    high
                    http://www.tiro.comname.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersname.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                      high
                      http://www.fontbureau.comessedfile.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.goodfont.co.krfile.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comname.exe, 00000004.00000003.216797322.000000000597C000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/~name.exe, 00000004.00000003.218188499.0000000005978000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comname.exe, 00000004.00000003.214006989.000000000598B000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDfile.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/cThefile.exe, 00000003.00000002.262971462.0000000006170000.00000002.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmfile.exe, 00000003.00000003.220798127.0000000006096000.00000004.00000001.sdmp, file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.comfile.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comF6file.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/rgename.exe, 00000004.00000003.218188499.0000000005978000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.comlicdfile.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/4name.exe, 00000004.00000003.218188499.0000000005978000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.comypname.exe, 00000004.00000003.214182404.000000000598B000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.galapagosdesign.com/wfile.exe, 00000003.00000003.220028378.0000000006096000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/iname.exe, 00000004.00000003.218188499.0000000005978000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/name.exe, 00000004.00000003.220508852.0000000005977000.00000004.00000001.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/anafile.exe, 00000003.00000003.217445274.0000000006083000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/DPleasefile.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comextname.exe, 00000004.00000003.216797322.000000000597C000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com9file.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.comalsofile.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fonts.comfile.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                          high
                          http://www.sandoll.co.krfile.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/&name.exe, 00000004.00000003.217929078.0000000005977000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.deDPleasefile.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.defile.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cnfile.exe, 00000003.00000002.262971462.0000000006170000.00000002.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefile.exe, 00000003.00000002.255141444.0000000003151000.00000004.00000001.sdmpfalse
                            high
                            http://www.sakkal.comfile.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com.TTFfile.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fonts.comxname.exe, 00000004.00000003.214233303.000000000598B000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.apache.org/licenses/LICENSE-2.0file.exe, 00000003.00000003.216324625.000000000608E000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                              high
                              http://www.fontbureau.comfile.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, file.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                                high
                                http://www.galapagosdesign.com/file.exe, 00000003.00000003.220028378.0000000006096000.00000004.00000001.sdmp, name.exe, 00000004.00000003.220508852.0000000005977000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp//sOfile.exe, 00000003.00000003.217445274.0000000006083000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.sajatypeworks.comwname.exe, 00000004.00000003.214006989.000000000598B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/Lname.exe, 00000004.00000003.217929078.0000000005977000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comionfile.exe, 00000003.00000003.253543403.000000000608A000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/ufile.exe, 00000003.00000003.217797992.0000000006089000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/file.exe, 00000003.00000003.217445274.0000000006083000.00000004.00000001.sdmp, file.exe, 00000003.00000003.217797992.0000000006089000.00000004.00000001.sdmp, name.exe, 00000004.00000003.217929078.0000000005977000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comafile.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/wname.exe, 00000004.00000003.217929078.0000000005977000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/?name.exe, 00000004.00000003.217929078.0000000005977000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comlfile.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNfile.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cnfile.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/xname.exe, 00000004.00000003.217929078.0000000005977000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-jones.htmlfile.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.jiyu-kobo.co.jp/ufile.exe, 00000003.00000003.217445274.0000000006083000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/file.exe, 00000003.00000003.217445274.0000000006083000.00000004.00000001.sdmp, name.exe, 00000004.00000003.218188499.0000000005978000.00000004.00000001.sdmp, name.exe, 00000004.00000003.217929078.0000000005977000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comofile.exe, 00000003.00000003.253543403.000000000608A000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8file.exe, 00000003.00000002.265434370.0000000007192000.00000004.00000001.sdmp, name.exe, 00000004.00000002.258227103.0000000005A60000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.fontbureau.comalicfile.exe, 00000003.00000003.219359586.000000000608E000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.founder.com.cn/cnticfile.exe, 00000003.00000003.215566337.000000000608E000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown

                                      Contacted IPs

                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs

                                      Public

                                      IPDomainCountryFlagASNASN NameMalicious
                                      191.96.25.26
                                      unknownChile
                                      40676AS40676USfalse
                                      87.98.245.48
                                      sys2021.linkpc.netFrance
                                      16276OVHFRfalse

                                      General Information

                                      Joe Sandbox Version:32.0.0 Black Diamond
                                      Analysis ID:411334
                                      Start date:11.05.2021
                                      Start time:20:00:27
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 13m 47s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:Invoice No F1019855_PDF.vbs
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:37
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winVBS@15/9@24/2
                                      EGA Information:Failed
                                      HDC Information:
                                      • Successful, ratio: 0.6% (good quality ratio 0.4%)
                                      • Quality average: 39.5%
                                      • Quality standard deviation: 33.8%
                                      HCA Information:
                                      • Successful, ratio: 97%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Found application associated with file extension: .vbs
                                      Warnings:
                                      Show All
                                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                      • TCP Packets have been reduced to 100
                                      • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 20.82.210.154, 168.61.161.212, 104.43.193.48, 92.122.145.220, 40.88.32.150, 23.57.80.111, 92.122.213.247, 92.122.213.194, 8.241.90.126, 8.241.78.126, 8.253.207.120, 67.26.75.254, 8.238.35.254, 51.103.5.186, 20.54.26.129
                                      • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, wns.notify.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, auto.au.download.windowsupdate.com.c.footprint.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, client.wns.windows.com, fs.microsoft.com, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus15.cloudapp.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                      • Report size getting too big, too many NtEnumerateKey calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryAttributesFile calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.

                                      Simulations

                                      Behavior and APIs

                                      TimeTypeDescription
                                      20:01:32API Interceptor1x Sleep call for process: file.exe modified
                                      20:01:33API Interceptor801x Sleep call for process: name.exe modified

                                      Joe Sandbox View / Context

                                      IPs

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      191.96.25.26Invoice No F1019855_PDF.vbsGet hashmaliciousBrowse
                                        Spec_PDF.vbsGet hashmaliciousBrowse
                                          SpecPDF.vbsGet hashmaliciousBrowse
                                            87.98.245.48Cotizacin.jarGet hashmaliciousBrowse
                                              ORDER-0319.pdf.exeGet hashmaliciousBrowse
                                                PO-21322.xlsmGet hashmaliciousBrowse
                                                  ORDER-21031566AF.exeGet hashmaliciousBrowse
                                                    Booking Confirmation 02222021951 - copy -PDF.exeGet hashmaliciousBrowse
                                                      Document.exeGet hashmaliciousBrowse
                                                        ORDER #0622.exeGet hashmaliciousBrowse
                                                          hiIXRIdkjB.exeGet hashmaliciousBrowse
                                                            LIST_OF_IDs.xlsGet hashmaliciousBrowse

                                                              Domains

                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                              sys2021.linkpc.netInvoice No F1019855_PDF.vbsGet hashmaliciousBrowse
                                                              • 79.137.109.121
                                                              Spec_PDF.vbsGet hashmaliciousBrowse
                                                              • 105.112.11.245
                                                              SpecPDF.vbsGet hashmaliciousBrowse
                                                              • 179.43.166.32

                                                              ASN

                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                              AS40676USGLqbDRKePPp16Zr.exeGet hashmaliciousBrowse
                                                              • 107.160.234.116
                                                              f41e9f9d_by_Libranalysis.exeGet hashmaliciousBrowse
                                                              • 107.160.177.197
                                                              Invoice No F1019855_PDF.vbsGet hashmaliciousBrowse
                                                              • 191.96.25.26
                                                              2f50000.exeGet hashmaliciousBrowse
                                                              • 38.39.192.78
                                                              PT6-1152.docGet hashmaliciousBrowse
                                                              • 45.61.136.72
                                                              PT6-1152.docGet hashmaliciousBrowse
                                                              • 45.61.136.72
                                                              wMqdemYyHm.exeGet hashmaliciousBrowse
                                                              • 104.217.141.249
                                                              70pGP1JaCf6M0kf.exeGet hashmaliciousBrowse
                                                              • 107.160.232.135
                                                              Spec_PDF.vbsGet hashmaliciousBrowse
                                                              • 191.96.25.26
                                                              8CgG2kY3Ow.dllGet hashmaliciousBrowse
                                                              • 45.61.138.153
                                                              DHL_S390201.exeGet hashmaliciousBrowse
                                                              • 45.34.249.30
                                                              978463537_BL FOR APPROVAL.docGet hashmaliciousBrowse
                                                              • 45.34.114.71
                                                              SpecPDF.vbsGet hashmaliciousBrowse
                                                              • 191.96.25.26
                                                              7mB68AZqJs.exeGet hashmaliciousBrowse
                                                              • 104.217.143.44
                                                              q3uHPdoxWP.exeGet hashmaliciousBrowse
                                                              • 172.107.55.6
                                                              NMpDBwHJP8.exeGet hashmaliciousBrowse
                                                              • 172.107.55.6
                                                              OrSxEMsYDA.exeGet hashmaliciousBrowse
                                                              • 107.160.118.15
                                                              swift note.xlsxGet hashmaliciousBrowse
                                                              • 107.160.118.15
                                                              sgJRcWvnkP.exeGet hashmaliciousBrowse
                                                              • 107.160.118.15
                                                              YPJ9DZYIpOGet hashmaliciousBrowse
                                                              • 107.169.29.204
                                                              OVHFRUjmadjok.exeGet hashmaliciousBrowse
                                                              • 51.222.195.7
                                                              Sibco.exeGet hashmaliciousBrowse
                                                              • 51.222.195.7
                                                              A1qhcbngFV.exeGet hashmaliciousBrowse
                                                              • 51.178.207.67
                                                              eGDBXEE70Awbg6D.exeGet hashmaliciousBrowse
                                                              • 66.70.204.222
                                                              94280a43_by_Libranalysis.exeGet hashmaliciousBrowse
                                                              • 54.39.198.225
                                                              PAYMENT INSTRUCTIONS COPY.exeGet hashmaliciousBrowse
                                                              • 213.186.33.5
                                                              w5FqUzyDmszpdwX.exeGet hashmaliciousBrowse
                                                              • 66.70.204.222
                                                              SNBDBM2No4.exeGet hashmaliciousBrowse
                                                              • 213.186.33.5
                                                              Garanti BBVA Payment Slip.exeGet hashmaliciousBrowse
                                                              • 66.70.204.222
                                                              Purchase Inquiry 11.05.2021.exeGet hashmaliciousBrowse
                                                              • 51.79.80.214
                                                              BORMAR SA_Cotizaci#U00f3n de producto doc.exeGet hashmaliciousBrowse
                                                              • 5.135.185.231
                                                              Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
                                                              • 167.114.48.59
                                                              Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
                                                              • 167.114.48.59
                                                              Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
                                                              • 167.114.48.59
                                                              520b670d_by_Libranalysis.xlsmGet hashmaliciousBrowse
                                                              • 51.195.38.32
                                                              520b670d_by_Libranalysis.xlsmGet hashmaliciousBrowse
                                                              • 51.195.38.32
                                                              520b670d_by_Libranalysis.xlsmGet hashmaliciousBrowse
                                                              • 51.195.38.32
                                                              blackGet hashmaliciousBrowse
                                                              • 91.121.140.167
                                                              .report_systemGet hashmaliciousBrowse
                                                              • 94.23.247.226
                                                              98c87992_by_Libranalysis.exeGet hashmaliciousBrowse
                                                              • 54.38.220.85

                                                              JA3 Fingerprints

                                                              No context

                                                              Dropped Files

                                                              No context

                                                              Created / dropped Files

                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\name.exe.log
                                                              Process:C:\Users\user\AppData\Local\Temp\name.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):655
                                                              Entropy (8bit):5.273171405160065
                                                              Encrypted:false
                                                              SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9t0U2WUXBQav:MLF20NaL329hJ5g522rWz2p29XBT
                                                              MD5:2703120C370FBB4A8BA08C6D1754039E
                                                              SHA1:EC0DB47BF00A4A828F796147619386C0BBEA66A1
                                                              SHA-256:F95566974BC44F3A757CAFB1456D185D8F333AC84775089DE18310B90C18B1BC
                                                              SHA-512:BC05A2A1BE5B122FC6D3DEA66EF4258522F13351B9754378395AAD019631E312CFD3BC990F3E3D5C7BB0BDBA1EAD54A2B34A96DEE2FCCD703721E98F6192ED48
                                                              Malicious:false
                                                              Reputation:moderate, very likely benign file
                                                              Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\4de99804c29261edb63c93616550f034\System.Management.ni.dll",0..
                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
                                                              Process:C:\Users\user\AppData\Local\Temp\file.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1308
                                                              Entropy (8bit):5.345811588615766
                                                              Encrypted:false
                                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                                              MD5:2E016B886BDB8389D2DD0867BE55F87B
                                                              SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                                              SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                                              SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                                              Malicious:false
                                                              Reputation:moderate, very likely benign file
                                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                              C:\Users\user\AppData\Local\Temp\file.exe
                                                              Process:C:\Windows\System32\wscript.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):703488
                                                              Entropy (8bit):7.213651737719658
                                                              Encrypted:false
                                                              SSDEEP:12288:doLLoS60/K7yh0K40auRhRwWSEUJu1NMm8kJ:doLApuRmZJu18E
                                                              MD5:E6A6EB2982AB17BBB7083493805823BA
                                                              SHA1:79D317D1F2E41E580CF84942C97C044C97A20A3A
                                                              SHA-256:263EB4034FE9B2BFE0E8472280BAB407EFFA3116391822A7CA34B2C480C438BF
                                                              SHA-512:7A91A5A264D9F28C68562082B85A18B7E1A90235318EA1222C96DDB0656EA1CBC58F47AE8E16CCADA708021011B69DBFB1D0F77B639C79F96903A77D119568EB
                                                              Malicious:true
                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2GZ...............0.............V.... ........@.. ....................... ............@.....................................O.................................................................................... ............... ..H............text...\.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................8.......H........e...~......v....................................................0...........r...p.+..*..0...........r...p.+..*".(.....*.0..C........(L...&............( ...h}........(!...h}.......("... ......(V...&*>...(#...(.....*..0..C........(L...&............( ...h}........(!...h}.......("... ......(V...&*>...(#...(.....*..0..2..........($.....(%........,...("......(&....('...(.....*>...(#...(.....*...0................b`.+..*...("... .......( ...h..(!...h(....(Q...&*..0..........
                                                              C:\Users\user\AppData\Local\Temp\name.exe
                                                              Process:C:\Windows\System32\wscript.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):784896
                                                              Entropy (8bit):7.328703413450174
                                                              Encrypted:false
                                                              SSDEEP:12288:OoLLoS60/K7yh036vCww4Scd3IGj483ESuvkuDKsjLtZTMfLodiMW2G:OoLA3AScdYKSvkItxeUdinh
                                                              MD5:43C4F163196FF02E7AA8C5040375FDA4
                                                              SHA1:F826B410B31CB251DD85F3663735B2F410906517
                                                              SHA-256:A585841F956F17925242996A98836B0D08767DDB179B4B41FD18A5DE719C531C
                                                              SHA-512:264FB4514257080068CEC2915BE6F81EA759812F059B9B969B2F40EE6E502497F22F66C0EFE9B2F5736D6C61F1C7967E9F801B1DF33D100261D4A1B560DDEF7E
                                                              Malicious:true
                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....c...............0.............:.... ... ....@.. .......................`............@.....................................O.... .......................@....................................................... ............... ..H............text...@.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H........e..,~......v...$....)...........................................0...........r...p.+..*..0...........r...p.+..*".(.....*.0..C........(L...&............(....h}........( ...h}.......(!... ......(V...&*>...("...(.....*..0..C........(L...&............(....h}........( ...h}.......(!... ......(V...&*>...("...(.....*..0..2..........(#.....($........,...(!......(%....(&...(.....*>...("...(.....*...0................b`.+..*...(!... .......(....h..( ...h(....(Q...&*..0..........
                                                              C:\Users\user\AppData\Local\Temp\tmpAD9.tmp
                                                              Process:C:\Users\user\AppData\Local\Temp\file.exe
                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1642
                                                              Entropy (8bit):5.192815293348326
                                                              Encrypted:false
                                                              SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB30tn:cbh47TlNQ//rydbz9I3YODOLNdq3g
                                                              MD5:E6F11A409139683DDF68EF89AA26A7F4
                                                              SHA1:C22B8452571C1B21B6DC42FD934AC5D89F506236
                                                              SHA-256:8DE96994F8D061A076A09392E6ABB30A7FFC1071CD655B47395783E2B1616E2E
                                                              SHA-512:3DD984011B2D39D0CA76C282F4391C94F95ACDA2917BE2C3304C976240F9651408AF8D38D34DDB49ABE3918B852EC69769DD4864DD41C5787A3547C938A36003
                                                              Malicious:true
                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                              C:\Users\user\AppData\Local\Temp\tmpC12.tmp
                                                              Process:C:\Users\user\AppData\Local\Temp\name.exe
                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1640
                                                              Entropy (8bit):5.186918440260069
                                                              Encrypted:false
                                                              SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBvtn:cbh47TlNQ//rydbz9I3YODOLNdq3D
                                                              MD5:5AAA212919E5C5942B4AF96D5F40E307
                                                              SHA1:B842F7B4B461F442963F87F92EF40C106A6AE72B
                                                              SHA-256:E751A34F0CF72662A8D9CAAA54A22CDB7B344E965A9CFAD36943612343C7EF5E
                                                              SHA-512:7E4B097A289BED9AF862B4B04F4990E1F06B317B7C4CEA70D3B334DB9F2E2D2EB23C0F3192F51149181C87A75D7606FC7008B1DFF82970AE19F117307F7A4518
                                                              Malicious:false
                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                              Process:C:\Users\user\AppData\Local\Temp\name.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):8
                                                              Entropy (8bit):3.0
                                                              Encrypted:false
                                                              SSDEEP:3:ax8t:68t
                                                              MD5:77A6F2F5CCD6DD1BFCDC998F7A58D479
                                                              SHA1:CFD03C773EF88A3FBCA9018C45311FD7D7770FDB
                                                              SHA-256:3BD10D98336C9729F78D458266C499AF4BDB01A79015E7F4F1B9CEA5C33B1E8E
                                                              SHA-512:EB90A4E934243F430E3EA744052EF22384815F3028E5AEECAF501A700A31A443553BA8FDD99DC18F5C8025E6A367A2A460EB775DA8895012C0FCEF2BD25D38FD
                                                              Malicious:true
                                                              Preview: .3.C...H
                                                              C:\Users\user\AppData\Roaming\JkeJLChUI.exe
                                                              Process:C:\Users\user\AppData\Local\Temp\file.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):703488
                                                              Entropy (8bit):7.213651737719658
                                                              Encrypted:false
                                                              SSDEEP:12288:doLLoS60/K7yh0K40auRhRwWSEUJu1NMm8kJ:doLApuRmZJu18E
                                                              MD5:E6A6EB2982AB17BBB7083493805823BA
                                                              SHA1:79D317D1F2E41E580CF84942C97C044C97A20A3A
                                                              SHA-256:263EB4034FE9B2BFE0E8472280BAB407EFFA3116391822A7CA34B2C480C438BF
                                                              SHA-512:7A91A5A264D9F28C68562082B85A18B7E1A90235318EA1222C96DDB0656EA1CBC58F47AE8E16CCADA708021011B69DBFB1D0F77B639C79F96903A77D119568EB
                                                              Malicious:false
                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2GZ...............0.............V.... ........@.. ....................... ............@.....................................O.................................................................................... ............... ..H............text...\.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................8.......H........e...~......v....................................................0...........r...p.+..*..0...........r...p.+..*".(.....*.0..C........(L...&............( ...h}........(!...h}.......("... ......(V...&*>...(#...(.....*..0..C........(L...&............( ...h}........(!...h}.......("... ......(V...&*>...(#...(.....*..0..2..........($.....(%........,...("......(&....('...(.....*>...(#...(.....*...0................b`.+..*...("... .......( ...h..(!...h(....(Q...&*..0..........
                                                              C:\Users\user\AppData\Roaming\LiydYED.exe
                                                              Process:C:\Users\user\AppData\Local\Temp\name.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):784896
                                                              Entropy (8bit):7.328703413450174
                                                              Encrypted:false
                                                              SSDEEP:12288:OoLLoS60/K7yh036vCww4Scd3IGj483ESuvkuDKsjLtZTMfLodiMW2G:OoLA3AScdYKSvkItxeUdinh
                                                              MD5:43C4F163196FF02E7AA8C5040375FDA4
                                                              SHA1:F826B410B31CB251DD85F3663735B2F410906517
                                                              SHA-256:A585841F956F17925242996A98836B0D08767DDB179B4B41FD18A5DE719C531C
                                                              SHA-512:264FB4514257080068CEC2915BE6F81EA759812F059B9B969B2F40EE6E502497F22F66C0EFE9B2F5736D6C61F1C7967E9F801B1DF33D100261D4A1B560DDEF7E
                                                              Malicious:false
                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....c...............0.............:.... ... ....@.. .......................`............@.....................................O.... .......................@....................................................... ............... ..H............text...@.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H........e..,~......v...$....)...........................................0...........r...p.+..*..0...........r...p.+..*".(.....*.0..C........(L...&............(....h}........( ...h}.......(!... ......(V...&*>...("...(.....*..0..C........(L...&............(....h}........( ...h}.......(!... ......(V...&*>...("...(.....*..0..2..........(#.....($........,...(!......(%....(&...(.....*>...("...(.....*...0................b`.+..*...(!... .......(....h..( ...h(....(Q...&*..0..........

                                                              Static File Info

                                                              General

                                                              File type:ASCII text, with very long lines, with CRLF line terminators
                                                              Entropy (8bit):5.738078637712689
                                                              TrID:
                                                              • Visual Basic Script (13500/0) 87.10%
                                                              • Disk Image (Macintosh), GPT (2000/0) 12.90%
                                                              File name:Invoice No F1019855_PDF.vbs
                                                              File size:2072856
                                                              MD5:fcf52f96d96c68788ffe13fcccd4c89c
                                                              SHA1:ca29113b7607ecb7d9a65d8285d7d36f367b1cd0
                                                              SHA256:fbc5a1e5f8a02c644cf207d40885c7973dc7e4809b97f676927da3e13e17ed1f
                                                              SHA512:bf38bab39d1358892b0d7fc65bfd8688078b4404de0edb3231a7c96b0d1df428786c5c8bf07ba07f7b88913a3a1de72d46063df689edc428e3132e8838540bf8
                                                              SSDEEP:24576:b+Ve64mPEkJd1XpdQ5YImc4yFNkVQtJpE5821c5+D5PTxrpWhFcW1Gi/zQSov0FF:bIz4ToQsx46J/0
                                                              File Content Preview:on error resume next..Dim RDMsYFgRTjlFiPOXgngfmYrotYHtgshiEaKISfIKcNDgFgGvTPhfBXNsMXzAymkaCCAHEFFAfVCZVKjMRLZRLBhgNSwugIMpdcdDfzqNKgAfUoXBomimNTPBVUumJKUXJNwthfhSVMGfBCLZvvFuZacJNciLEDEAMcWGrdUIEQQANjzTIVrOEZyjlmfFxWNSIGSYfEhR..'bxpIJbwdcPCjMpwmenVFyOLiCy

                                                              File Icon

                                                              Icon Hash:e8d69ece869a9ec4

                                                              Network Behavior

                                                              Network Port Distribution

                                                              TCP Packets

                                                              TimestampSource PortDest PortSource IPDest IP
                                                              May 11, 2021 20:01:41.735663891 CEST4972511940192.168.2.387.98.245.48
                                                              May 11, 2021 20:01:42.043533087 CEST119404972587.98.245.48192.168.2.3
                                                              May 11, 2021 20:01:42.612586021 CEST4972511940192.168.2.387.98.245.48
                                                              May 11, 2021 20:01:42.946511984 CEST119404972587.98.245.48192.168.2.3
                                                              May 11, 2021 20:01:43.612987041 CEST4972511940192.168.2.387.98.245.48
                                                              May 11, 2021 20:01:43.841502905 CEST119404972587.98.245.48192.168.2.3
                                                              May 11, 2021 20:01:49.301887035 CEST4972911940192.168.2.387.98.245.48
                                                              May 11, 2021 20:01:49.632344961 CEST119404972987.98.245.48192.168.2.3
                                                              May 11, 2021 20:01:50.222598076 CEST4972911940192.168.2.387.98.245.48
                                                              May 11, 2021 20:01:50.553210020 CEST119404972987.98.245.48192.168.2.3
                                                              May 11, 2021 20:01:51.222748995 CEST4972911940192.168.2.387.98.245.48
                                                              May 11, 2021 20:01:51.523634911 CEST119404972987.98.245.48192.168.2.3
                                                              May 11, 2021 20:01:54.401385069 CEST4973210090192.168.2.387.98.245.48
                                                              May 11, 2021 20:01:54.673207998 CEST100904973287.98.245.48192.168.2.3
                                                              May 11, 2021 20:01:55.222990036 CEST4973210090192.168.2.387.98.245.48
                                                              May 11, 2021 20:01:55.433574915 CEST100904973287.98.245.48192.168.2.3
                                                              May 11, 2021 20:01:55.743906021 CEST4973311940192.168.2.387.98.245.48
                                                              May 11, 2021 20:01:56.019952059 CEST4973210090192.168.2.387.98.245.48
                                                              May 11, 2021 20:01:56.042218924 CEST119404973387.98.245.48192.168.2.3
                                                              May 11, 2021 20:01:56.347024918 CEST100904973287.98.245.48192.168.2.3
                                                              May 11, 2021 20:01:56.613817930 CEST4973311940192.168.2.387.98.245.48
                                                              May 11, 2021 20:01:56.864617109 CEST119404973387.98.245.48192.168.2.3
                                                              May 11, 2021 20:01:57.426366091 CEST4973311940192.168.2.387.98.245.48
                                                              May 11, 2021 20:01:57.715471983 CEST119404973387.98.245.48192.168.2.3
                                                              May 11, 2021 20:01:58.201350927 CEST4973410090192.168.2.387.98.245.48
                                                              May 11, 2021 20:01:58.439827919 CEST100904973487.98.245.48192.168.2.3
                                                              May 11, 2021 20:01:58.980581045 CEST4973410090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:01.726294041 CEST4973611940192.168.2.3191.96.25.26
                                                              May 11, 2021 20:02:01.915411949 CEST1194049736191.96.25.26192.168.2.3
                                                              May 11, 2021 20:02:02.426779985 CEST4973611940192.168.2.3191.96.25.26
                                                              May 11, 2021 20:02:02.615673065 CEST1194049736191.96.25.26192.168.2.3
                                                              May 11, 2021 20:02:03.224565983 CEST4973611940192.168.2.3191.96.25.26
                                                              May 11, 2021 20:02:03.413295031 CEST1194049736191.96.25.26192.168.2.3
                                                              May 11, 2021 20:02:05.114484072 CEST4973410090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:05.374241114 CEST100904973487.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:07.429775000 CEST4973911940192.168.2.3191.96.25.26
                                                              May 11, 2021 20:02:07.618309021 CEST1194049739191.96.25.26192.168.2.3
                                                              May 11, 2021 20:02:08.224159002 CEST4973911940192.168.2.3191.96.25.26
                                                              May 11, 2021 20:02:08.412794113 CEST1194049739191.96.25.26192.168.2.3
                                                              May 11, 2021 20:02:08.785770893 CEST4974010090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:08.927269936 CEST4973911940192.168.2.3191.96.25.26
                                                              May 11, 2021 20:02:09.025546074 CEST100904974087.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:09.118798971 CEST1194049739191.96.25.26192.168.2.3
                                                              May 11, 2021 20:02:09.614939928 CEST4974010090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:09.847903967 CEST100904974087.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:10.427467108 CEST4974010090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:10.706358910 CEST100904974087.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:12.841183901 CEST4974110090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:13.165374994 CEST4974211940192.168.2.3191.96.25.26
                                                              May 11, 2021 20:02:13.275830030 CEST100904974187.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:13.355648994 CEST1194049742191.96.25.26192.168.2.3
                                                              May 11, 2021 20:02:13.927700996 CEST4974211940192.168.2.3191.96.25.26
                                                              May 11, 2021 20:02:13.927778959 CEST4974110090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:14.116558075 CEST1194049742191.96.25.26192.168.2.3
                                                              May 11, 2021 20:02:14.227073908 CEST100904974187.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:14.724626064 CEST4974211940192.168.2.3191.96.25.26
                                                              May 11, 2021 20:02:14.913285017 CEST1194049742191.96.25.26192.168.2.3
                                                              May 11, 2021 20:02:14.927854061 CEST4974110090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:15.149918079 CEST100904974187.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:17.089134932 CEST4974310090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:17.439536095 CEST100904974387.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:18.115554094 CEST4974310090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:18.454447031 CEST100904974387.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:19.076059103 CEST4974310090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:19.098360062 CEST4974711940192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:19.323482037 CEST100904974387.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:19.323514938 CEST119404974787.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:19.928250074 CEST4974711940192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:20.175740004 CEST119404974787.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:20.725198984 CEST4974711940192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:20.938369036 CEST119404974787.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:24.276612043 CEST4974810090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:24.593111992 CEST100904974887.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:25.084472895 CEST4974911940192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:25.225553036 CEST4974810090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:25.354984045 CEST119404974987.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:25.508436918 CEST100904974887.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:25.928728104 CEST4974911940192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:26.116236925 CEST4974810090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:26.236618996 CEST119404974987.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:26.417285919 CEST100904974887.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:26.944396973 CEST4974911940192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:27.213268995 CEST119404974987.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:27.916582108 CEST4975110090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:28.171042919 CEST100904975187.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:28.725832939 CEST4975110090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:29.084631920 CEST100904975187.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:29.616579056 CEST4975110090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:29.918757915 CEST100904975187.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:31.867494106 CEST4975211940192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:32.117743015 CEST119404975287.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:32.726202011 CEST4975211940192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:33.025172949 CEST119404975287.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:33.186909914 CEST4975310090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:33.480001926 CEST100904975387.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:33.616836071 CEST4975211940192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:33.847836018 CEST119404975287.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:34.040884018 CEST4975310090192.168.2.387.98.245.48
                                                              May 11, 2021 20:02:34.270885944 CEST100904975387.98.245.48192.168.2.3
                                                              May 11, 2021 20:02:34.929462910 CEST4975310090192.168.2.387.98.245.48

                                                              UDP Packets

                                                              TimestampSource PortDest PortSource IPDest IP
                                                              May 11, 2021 20:01:07.004765034 CEST5128153192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:07.038886070 CEST4919953192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:07.066556931 CEST53512818.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:07.098418951 CEST53491998.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:07.494817972 CEST5062053192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:07.548559904 CEST53506208.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:09.228950977 CEST6493853192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:09.278584003 CEST53649388.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:10.152699947 CEST6015253192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:10.162095070 CEST5754453192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:10.202456951 CEST53601528.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:10.224232912 CEST53575448.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:11.907697916 CEST5598453192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:11.959342957 CEST53559848.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:13.059474945 CEST6418553192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:13.109622955 CEST53641858.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:15.595402002 CEST6511053192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:15.644582033 CEST53651108.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:16.662657022 CEST5836153192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:16.714410067 CEST53583618.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:17.499386072 CEST6349253192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:17.548319101 CEST53634928.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:18.377249956 CEST6083153192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:18.428778887 CEST53608318.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:19.277311087 CEST6010053192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:19.326052904 CEST53601008.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:20.349581957 CEST5319553192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:20.401139021 CEST53531958.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:21.546789885 CEST5014153192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:21.603723049 CEST53501418.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:22.402873993 CEST5302353192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:22.451591969 CEST53530238.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:23.730110884 CEST4956353192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:23.779150009 CEST53495638.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:24.779067993 CEST5135253192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:24.827877998 CEST53513528.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:34.007759094 CEST5934953192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:34.064801931 CEST53593498.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:35.142046928 CEST5708453192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:35.190892935 CEST53570848.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:37.435523033 CEST5882353192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:37.487049103 CEST53588238.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:38.464363098 CEST5756853192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:38.514513969 CEST53575688.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:41.509277105 CEST5054053192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:41.686825037 CEST53505408.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:45.616272926 CEST5436653192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:45.680080891 CEST53543668.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:49.138422966 CEST5303453192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:49.299673080 CEST53530348.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:53.265803099 CEST5776253192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:53.340054989 CEST53577628.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:54.340051889 CEST5543553192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:54.397157907 CEST53554358.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:55.685375929 CEST5071353192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:55.742697001 CEST53507138.8.8.8192.168.2.3
                                                              May 11, 2021 20:01:58.142092943 CEST5613253192.168.2.38.8.8.8
                                                              May 11, 2021 20:01:58.199521065 CEST53561328.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:01.318304062 CEST5898753192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:01.377551079 CEST53589878.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:02.242511034 CEST5657953192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:02.291301012 CEST53565798.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:03.740212917 CEST6063353192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:03.788909912 CEST53606338.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:08.667450905 CEST6129253192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:08.726759911 CEST53612928.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:12.782820940 CEST6361953192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:12.839679003 CEST53636198.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:16.987337112 CEST6493853192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:17.026994944 CEST6194653192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:17.047297001 CEST53649388.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:17.087491035 CEST53619468.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:18.992469072 CEST6491053192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:19.051923037 CEST53649108.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:24.215464115 CEST5212353192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:24.275331974 CEST53521238.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:25.024122953 CEST5613053192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:25.083309889 CEST53561308.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:26.134937048 CEST5633853192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:26.204402924 CEST53563388.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:27.854428053 CEST5942053192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:27.914695978 CEST53594208.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:31.807564974 CEST5878453192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:31.865056992 CEST53587848.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:33.124355078 CEST6397853192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:33.185776949 CEST53639788.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:39.061223030 CEST6293853192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:39.118395090 CEST53629388.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:45.022650957 CEST5570853192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:45.071504116 CEST53557088.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:54.950963974 CEST5680353192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:55.106497049 CEST53568038.8.8.8192.168.2.3
                                                              May 11, 2021 20:02:55.939254045 CEST5714553192.168.2.38.8.8.8
                                                              May 11, 2021 20:02:56.006665945 CEST53571458.8.8.8192.168.2.3
                                                              May 11, 2021 20:03:00.298666954 CEST5535953192.168.2.38.8.8.8
                                                              May 11, 2021 20:03:00.347470999 CEST53553598.8.8.8192.168.2.3
                                                              May 11, 2021 20:03:00.979793072 CEST5830653192.168.2.38.8.8.8
                                                              May 11, 2021 20:03:01.040043116 CEST53583068.8.8.8192.168.2.3
                                                              May 11, 2021 20:03:06.509145021 CEST6412453192.168.2.38.8.8.8
                                                              May 11, 2021 20:03:06.566308022 CEST53641248.8.8.8192.168.2.3
                                                              May 11, 2021 20:03:06.962580919 CEST4936153192.168.2.38.8.8.8
                                                              May 11, 2021 20:03:07.019815922 CEST53493618.8.8.8192.168.2.3
                                                              May 11, 2021 20:03:08.108690977 CEST6315053192.168.2.38.8.8.8
                                                              May 11, 2021 20:03:08.179083109 CEST53631508.8.8.8192.168.2.3
                                                              May 11, 2021 20:03:10.875622034 CEST5327953192.168.2.38.8.8.8
                                                              May 11, 2021 20:03:10.933634043 CEST53532798.8.8.8192.168.2.3
                                                              May 11, 2021 20:03:16.381038904 CEST5688153192.168.2.38.8.8.8
                                                              May 11, 2021 20:03:16.433048010 CEST53568818.8.8.8192.168.2.3
                                                              May 11, 2021 20:03:21.888761044 CEST5364253192.168.2.38.8.8.8
                                                              May 11, 2021 20:03:21.940306902 CEST53536428.8.8.8192.168.2.3

                                                              DNS Queries

                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                              May 11, 2021 20:01:41.509277105 CEST192.168.2.38.8.8.80xdc43Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:01:49.138422966 CEST192.168.2.38.8.8.80xfdd3Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:01:54.340051889 CEST192.168.2.38.8.8.80x3f92Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:01:55.685375929 CEST192.168.2.38.8.8.80x6470Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:01:58.142092943 CEST192.168.2.38.8.8.80x8b06Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:08.667450905 CEST192.168.2.38.8.8.80xc699Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:12.782820940 CEST192.168.2.38.8.8.80xa310Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:17.026994944 CEST192.168.2.38.8.8.80x9bb6Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:18.992469072 CEST192.168.2.38.8.8.80x9788Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:24.215464115 CEST192.168.2.38.8.8.80x6bf9Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:25.024122953 CEST192.168.2.38.8.8.80x23e1Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:27.854428053 CEST192.168.2.38.8.8.80xb19eStandard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:31.807564974 CEST192.168.2.38.8.8.80xfb83Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:33.124355078 CEST192.168.2.38.8.8.80x1f14Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:39.061223030 CEST192.168.2.38.8.8.80xf4f9Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:45.022650957 CEST192.168.2.38.8.8.80x6655Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:54.950963974 CEST192.168.2.38.8.8.80x2f8aStandard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:03:00.298666954 CEST192.168.2.38.8.8.80xc300Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:03:00.979793072 CEST192.168.2.38.8.8.80x8706Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:03:06.509145021 CEST192.168.2.38.8.8.80x48a4Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:03:06.962580919 CEST192.168.2.38.8.8.80xf1e5Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:03:10.875622034 CEST192.168.2.38.8.8.80xff27Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:03:16.381038904 CEST192.168.2.38.8.8.80x7101Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                              May 11, 2021 20:03:21.888761044 CEST192.168.2.38.8.8.80x307eStandard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)

                                                              DNS Answers

                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                              May 11, 2021 20:01:41.686825037 CEST8.8.8.8192.168.2.30xdc43No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:01:49.299673080 CEST8.8.8.8192.168.2.30xfdd3No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:01:54.397157907 CEST8.8.8.8192.168.2.30x3f92No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:01:55.742697001 CEST8.8.8.8192.168.2.30x6470No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:01:58.199521065 CEST8.8.8.8192.168.2.30x8b06No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:08.726759911 CEST8.8.8.8192.168.2.30xc699No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:12.839679003 CEST8.8.8.8192.168.2.30xa310No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:17.087491035 CEST8.8.8.8192.168.2.30x9bb6No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:19.051923037 CEST8.8.8.8192.168.2.30x9788No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:24.275331974 CEST8.8.8.8192.168.2.30x6bf9No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:25.083309889 CEST8.8.8.8192.168.2.30x23e1No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:27.914695978 CEST8.8.8.8192.168.2.30xb19eNo error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:31.865056992 CEST8.8.8.8192.168.2.30xfb83No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:33.185776949 CEST8.8.8.8192.168.2.30x1f14No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:39.118395090 CEST8.8.8.8192.168.2.30xf4f9No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:45.071504116 CEST8.8.8.8192.168.2.30x6655No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:02:55.106497049 CEST8.8.8.8192.168.2.30x2f8aNo error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:03:00.347470999 CEST8.8.8.8192.168.2.30xc300No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:03:01.040043116 CEST8.8.8.8192.168.2.30x8706No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:03:06.566308022 CEST8.8.8.8192.168.2.30x48a4No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:03:07.019815922 CEST8.8.8.8192.168.2.30xf1e5No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:03:10.933634043 CEST8.8.8.8192.168.2.30xff27No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:03:16.433048010 CEST8.8.8.8192.168.2.30x7101No error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)
                                                              May 11, 2021 20:03:21.940306902 CEST8.8.8.8192.168.2.30x307eNo error (0)sys2021.linkpc.net87.98.245.48A (IP address)IN (0x0001)

                                                              Code Manipulations

                                                              Statistics

                                                              Behavior

                                                              Click to jump to process

                                                              System Behavior

                                                              General

                                                              Start time:20:01:15
                                                              Start date:11/05/2021
                                                              Path:C:\Windows\System32\wscript.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Invoice No F1019855_PDF.vbs'
                                                              Imagebase:0x7ff78dde0000
                                                              File size:163840 bytes
                                                              MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              General

                                                              Start time:20:01:20
                                                              Start date:11/05/2021
                                                              Path:C:\Users\user\AppData\Local\Temp\file.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:'C:\Users\user\AppData\Local\Temp\file.exe'
                                                              Imagebase:0xd70000
                                                              File size:703488 bytes
                                                              MD5 hash:E6A6EB2982AB17BBB7083493805823BA
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Yara matches:
                                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000003.00000002.255078777.00000000030F1000.00000004.00000001.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000003.00000002.256966112.00000000040F9000.00000004.00000001.sdmp, Author: Joe Security
                                                              Reputation:low

                                                              General

                                                              Start time:20:01:20
                                                              Start date:11/05/2021
                                                              Path:C:\Users\user\AppData\Local\Temp\name.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:'C:\Users\user\AppData\Local\Temp\name.exe'
                                                              Imagebase:0xcd0000
                                                              File size:784896 bytes
                                                              MD5 hash:43C4F163196FF02E7AA8C5040375FDA4
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Yara matches:
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.254692678.0000000004551000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.254692678.0000000004551000.00000004.00000001.sdmp, Author: Joe Security
                                                              • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.254692678.0000000004551000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                              Reputation:low

                                                              General

                                                              Start time:20:01:36
                                                              Start date:11/05/2021
                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\JkeJLChUI' /XML 'C:\Users\user\AppData\Local\Temp\tmpAD9.tmp'
                                                              Imagebase:0x2a0000
                                                              File size:185856 bytes
                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              General

                                                              Start time:20:01:36
                                                              Start date:11/05/2021
                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LiydYED' /XML 'C:\Users\user\AppData\Local\Temp\tmpC12.tmp'
                                                              Imagebase:0x2a0000
                                                              File size:185856 bytes
                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              General

                                                              Start time:20:01:37
                                                              Start date:11/05/2021
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff6b2800000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              General

                                                              Start time:20:01:37
                                                              Start date:11/05/2021
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff6b2800000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              General

                                                              Start time:20:01:37
                                                              Start date:11/05/2021
                                                              Path:C:\Users\user\AppData\Local\Temp\file.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:{path}
                                                              Imagebase:0xd60000
                                                              File size:703488 bytes
                                                              MD5 hash:E6A6EB2982AB17BBB7083493805823BA
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Yara matches:
                                                              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000A.00000002.468822970.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                              Reputation:low

                                                              General

                                                              Start time:20:01:38
                                                              Start date:11/05/2021
                                                              Path:C:\Users\user\AppData\Local\Temp\name.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:{path}
                                                              Imagebase:0x980000
                                                              File size:784896 bytes
                                                              MD5 hash:43C4F163196FF02E7AA8C5040375FDA4
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Yara matches:
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.477861276.0000000005590000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.477861276.0000000005590000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.476715022.0000000004087000.00000004.00000001.sdmp, Author: Joe Security
                                                              • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.476715022.0000000004087000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.468941603.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.468941603.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                              • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.468941603.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.478086503.0000000005950000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.478086503.0000000005950000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.478086503.0000000005950000.00000004.00000001.sdmp, Author: Joe Security
                                                              Reputation:low

                                                              Disassembly

                                                              Code Analysis

                                                              Reset < >