Loading ...

Play interactive tourEdit tour

Analysis Report 03_extracted.exe

Overview

General Information

Sample Name:03_extracted.exe
Analysis ID:412751
MD5:43c4f163196ff02e7aa8c5040375fda4
SHA1:f826b410b31cb251dd85f3663735b2f410906517
SHA256:a585841f956f17925242996a98836b0d08767ddb179b4b41fd18a5de719c531c
Tags:exe
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Binary contains a suspicious time stamp
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • 03_extracted.exe (PID: 5976 cmdline: 'C:\Users\user\Desktop\03_extracted.exe' MD5: 43C4F163196FF02E7AA8C5040375FDA4)
    • schtasks.exe (PID: 4652 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LiydYED' /XML 'C:\Users\user\AppData\Local\Temp\tmpE7C8.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • 03_extracted.exe (PID: 5548 cmdline: {path} MD5: 43C4F163196FF02E7AA8C5040375FDA4)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "c687c38e-2b2d-4d96-b5eb-9a31ccba", "Group": "Sys", "Domain1": "sys2021.linkpc.net", "Domain2": "", "Port": 11940, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.489322816.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000006.00000002.489322816.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000006.00000002.489322816.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000006.00000002.496381211.0000000003DE7000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000006.00000002.496381211.0000000003DE7000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x33e5:$a: NanoCore
      • 0x343e:$a: NanoCore
      • 0x347b:$a: NanoCore
      • 0x34f4:$a: NanoCore
      • 0x16b9f:$a: NanoCore
      • 0x16bb4:$a: NanoCore
      • 0x16be9:$a: NanoCore
      • 0x2f663:$a: NanoCore
      • 0x2f678:$a: NanoCore
      • 0x2f6ad:$a: NanoCore
      • 0x3447:$b: ClientPlugin
      • 0x3484:$b: ClientPlugin
      • 0x3d82:$b: ClientPlugin
      • 0x3d8f:$b: ClientPlugin
      • 0x1695b:$b: ClientPlugin
      • 0x16976:$b: ClientPlugin
      • 0x169a6:$b: ClientPlugin
      • 0x16bbd:$b: ClientPlugin
      • 0x16bf2:$b: ClientPlugin
      • 0x2f41f:$b: ClientPlugin
      • 0x2f43a:$b: ClientPlugin
      Click to see the 15 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      6.2.03_extracted.exe.3dee43c.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xf7ad:$x1: NanoCore.ClientPluginHost
      • 0x28271:$x1: NanoCore.ClientPluginHost
      • 0xf7da:$x2: IClientNetworkHost
      • 0x2829e:$x2: IClientNetworkHost
      6.2.03_extracted.exe.3dee43c.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xf7ad:$x2: NanoCore.ClientPluginHost
      • 0x28271:$x2: NanoCore.ClientPluginHost
      • 0x10888:$s4: PipeCreated
      • 0x2934c:$s4: PipeCreated
      • 0xf7c7:$s5: IClientLoggingHost
      • 0x2828b:$s5: IClientLoggingHost
      6.2.03_extracted.exe.3dee43c.5.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        6.2.03_extracted.exe.5654629.11.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xb184:$x1: NanoCore.ClientPluginHost
        • 0xb1b1:$x2: IClientNetworkHost
        6.2.03_extracted.exe.5654629.11.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xb184:$x2: NanoCore.ClientPluginHost
        • 0xc25f:$s4: PipeCreated
        • 0xb19e:$s5: IClientLoggingHost
        Click to see the 37 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\03_extracted.exe, ProcessId: 5548, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\03_extracted.exe, ProcessId: 5548, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\03_extracted.exe, ProcessId: 5548, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\03_extracted.exe, ProcessId: 5548, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000006.00000002.496381211.0000000003DE7000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "c687c38e-2b2d-4d96-b5eb-9a31ccba", "Group": "Sys", "Domain1": "sys2021.linkpc.net", "Domain2": "", "Port": 11940, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\LiydYED.exeReversingLabs: Detection: 41%
        Multi AV Scanner detection for submitted fileShow sources
        Source: 03_extracted.exeVirustotal: Detection: 41%Perma Link
        Source: 03_extracted.exeReversingLabs: Detection: 41%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000006.00000002.489322816.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.496381211.0000000003DE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.497557539.0000000005650000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.252199912.00000000048E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 03_extracted.exe PID: 5976, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 03_extracted.exe PID: 5548, type: MEMORY
        Source: Yara matchFile source: 6.2.03_extracted.exe.3dee43c.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.5654629.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.3dee43c.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4b68c38.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.3de9606.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.3df2a65.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.5650000.12.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.5650000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4c88090.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4a679c8.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4b68c38.2.raw.unpack, type: UNPACKEDPE
        Source: 6.2.03_extracted.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 6.2.03_extracted.exe.5650000.12.unpackAvira: Label: TR/NanoCore.fadte
        Source: 03_extracted.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: C:\Users\user\Desktop\03_extracted.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: 03_extracted.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: mscorrc.pdb source: 03_extracted.exe, 00000000.00000002.261775568.0000000007810000.00000002.00000001.sdmp, 03_extracted.exe, 00000006.00000002.497026294.00000000051D0000.00000002.00000001.sdmp

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs:
        Source: Malware configuration extractorURLs: sys2021.linkpc.net
        Source: global trafficTCP traffic: 192.168.2.5:49708 -> 79.137.109.121:11940
        Source: global trafficTCP traffic: 192.168.2.5:49716 -> 191.96.25.26:11940
        Source: Joe Sandbox ViewIP Address: 79.137.109.121 79.137.109.121
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownDNS traffic detected: queries for: sys2021.linkpc.net
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmp, 03_extracted.exe, 00000000.00000003.228394931.0000000005AAD000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: 03_extracted.exe, 00000000.00000003.228394931.0000000005AAD000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers4
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: 03_extracted.exe, 00000000.00000002.254191981.0000000005AA0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comgrita
        Source: 03_extracted.exe, 00000000.00000002.254191981.0000000005AA0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.como
        Source: 03_extracted.exe, 00000000.00000002.254191981.0000000005AA0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comt
        Source: 03_extracted.exe, 00000000.00000003.223324934.0000000005ABB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: 03_extracted.exe, 00000000.00000003.223303861.0000000005ABB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com0
        Source: 03_extracted.exe, 00000000.00000003.223286632.0000000005ABB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comlo
        Source: 03_extracted.exe, 00000000.00000003.225848525.0000000005AAC000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: 03_extracted.exe, 00000000.00000003.224453104.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn#
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: 03_extracted.exe, 00000000.00000003.224684993.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnLog
        Source: 03_extracted.exe, 00000000.00000003.224684993.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cne
        Source: 03_extracted.exe, 00000000.00000003.224439658.0000000005ADD000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cng
        Source: 03_extracted.exe, 00000000.00000003.224439658.0000000005ADD000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnk-s
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: 03_extracted.exe, 00000000.00000003.226058625.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/;
        Source: 03_extracted.exe, 00000000.00000003.226058625.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/a-e
        Source: 03_extracted.exe, 00000000.00000003.226058625.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/a-e$
        Source: 03_extracted.exe, 00000000.00000003.226058625.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ita
        Source: 03_extracted.exe, 00000000.00000003.226058625.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: 03_extracted.exe, 00000000.00000003.226058625.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/-
        Source: 03_extracted.exe, 00000000.00000003.226058625.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/s
        Source: 03_extracted.exe, 00000000.00000003.223195518.0000000005ABB000.00000004.00000001.sdmp, 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: 03_extracted.exe, 00000000.00000003.223195518.0000000005ABB000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com-d
        Source: 03_extracted.exe, 00000000.00000003.223195518.0000000005ABB000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comhe
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: 03_extracted.exe, 00000000.00000003.224075054.0000000005AA6000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krense
        Source: 03_extracted.exe, 00000000.00000003.224075054.0000000005AA6000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krt
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmp, 03_extracted.exe, 00000000.00000003.223530764.0000000005ABB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: 03_extracted.exe, 00000000.00000003.223493292.0000000005ABB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com.
        Source: 03_extracted.exe, 00000000.00000003.223512202.0000000005ABB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comc
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: 03_extracted.exe, 00000006.00000002.496381211.0000000003DE7000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000006.00000002.489322816.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.496381211.0000000003DE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.497557539.0000000005650000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.252199912.00000000048E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 03_extracted.exe PID: 5976, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 03_extracted.exe PID: 5548, type: MEMORY
        Source: Yara matchFile source: 6.2.03_extracted.exe.3dee43c.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.5654629.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.3dee43c.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4b68c38.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.3de9606.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.3df2a65.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.5650000.12.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.5650000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4c88090.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4a679c8.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4b68c38.2.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000006.00000002.489322816.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.489322816.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.496381211.0000000003DE7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.497217215.0000000005290000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.497557539.0000000005650000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.252199912.00000000048E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.252199912.00000000048E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: 03_extracted.exe PID: 5976, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: 03_extracted.exe PID: 5976, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: 03_extracted.exe PID: 5548, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: 03_extracted.exe PID: 5548, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.03_extracted.exe.3dee43c.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.03_extracted.exe.5654629.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.03_extracted.exe.3dee43c.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.03_extracted.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.03_extracted.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.03_extracted.exe.4b68c38.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.03_extracted.exe.4b68c38.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.03_extracted.exe.5290000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.03_extracted.exe.3de9606.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.03_extracted.exe.3de9606.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.03_extracted.exe.3df2a65.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.03_extracted.exe.5650000.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.03_extracted.exe.5650000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.03_extracted.exe.4c88090.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.03_extracted.exe.4c88090.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.03_extracted.exe.2db12e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.03_extracted.exe.4a679c8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.03_extracted.exe.4a679c8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.03_extracted.exe.4b68c38.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.03_extracted.exe.4b68c38.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_077A28A2 NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_077A2868 NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_0504116A NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_0504112F NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_00FB608D
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_00FB6281
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2ADE8
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C26998
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C22598
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2E558
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2C030
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C23BD8
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C24B40
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C25B60
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C236A0
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C25268
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2ADD8
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C26980
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C22588
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2E544
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2A150
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2A950
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2A160
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2A960
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2B108
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C28108
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2E91C
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2E924
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C280F8
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2B0F8
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2E8FF
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C28880
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C28890
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2E8A3
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C28C48
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C28C58
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C24008
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C24018
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2C020
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C29BC0
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2DFC0
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2DFD0
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2E780
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C29BB0
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C25B52
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2E756
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C24B28
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C276C0
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2368F
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C28A98
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C286A0
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C28AA8
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C286B0
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C276BA
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C25259
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2EE60
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2E63E
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_07F3366F
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_07F31BB8
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_07F31BA9
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_07F31710
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_07F31700
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_07F32E27
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_0068608D
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_00686281
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_00F27AC1
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_04F18468
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_04F19068
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_04F13850
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_04F1AD38
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_04F123A0
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_04F12FA8
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_04F1306F
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_04F1912F
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_04F19910
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\LiydYED.exe A585841F956F17925242996A98836B0D08767DDB179B4B41FD18A5DE719C531C
        Source: 03_extracted.exe, 00000000.00000002.263108086.00000000082B0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs 03_extracted.exe
        Source: 03_extracted.exe, 00000000.00000002.263108086.00000000082B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs 03_extracted.exe
        Source: 03_extracted.exe, 00000000.00000002.260983147.0000000007390000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs 03_extracted.exe
        Source: 03_extracted.exe, 00000000.00000002.261775568.0000000007810000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs 03_extracted.exe
        Source: 03_extracted.exe, 00000000.00000000.222021679.0000000001072000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameMXvDG34.exe< vs 03_extracted.exe
        Source: 03_extracted.exe, 00000000.00000002.260517395.0000000007190000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSmartFormat.dll8 vs 03_extracted.exe
        Source: 03_extracted.exe, 00000000.00000002.262495313.00000000081C0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs 03_extracted.exe
        Source: 03_extracted.exe, 00000006.00000000.245773708.0000000000742000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameMXvDG34.exe< vs 03_extracted.exe
        Source: 03_extracted.exe, 00000006.00000002.497026294.00000000051D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs 03_extracted.exe
        Source: 03_extracted.exe, 00000006.00000002.497543872.0000000005640000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 03_extracted.exe
        Source: 03_extracted.exe, 00000006.00000002.497327707.0000000005500000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs 03_extracted.exe
        Source: 03_extracted.exe, 00000006.00000002.496826648.0000000005030000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs 03_extracted.exe
        Source: 03_extracted.exe, 00000006.00000002.494608328.0000000002DA1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 03_extracted.exe
        Source: 03_extracted.exe, 00000006.00000002.496381211.0000000003DE7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 03_extracted.exe
        Source: 03_extracted.exeBinary or memory string: OriginalFilenameMXvDG34.exe< vs 03_extracted.exe
        Source: 03_extracted.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000006.00000002.489322816.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.489322816.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.496381211.0000000003DE7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.497217215.0000000005290000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.497217215.0000000005290000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000006.00000002.497557539.0000000005650000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.497557539.0000000005650000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000000.00000002.252199912.00000000048E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.252199912.00000000048E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: 03_extracted.exe PID: 5976, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: 03_extracted.exe PID: 5976, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: 03_extracted.exe PID: 5548, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: 03_extracted.exe PID: 5548, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.03_extracted.exe.3dee43c.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.03_extracted.exe.3dee43c.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.03_extracted.exe.5654629.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.03_extracted.exe.5654629.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.03_extracted.exe.3dee43c.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.03_extracted.exe.3dee43c.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.03_extracted.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.03_extracted.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.03_extracted.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.03_extracted.exe.4b68c38.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.03_extracted.exe.4b68c38.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.03_extracted.exe.4b68c38.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.03_extracted.exe.5290000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.03_extracted.exe.5290000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.03_extracted.exe.3de9606.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.03_extracted.exe.3de9606.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.03_extracted.exe.3de9606.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.03_extracted.exe.3df2a65.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.03_extracted.exe.3df2a65.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.03_extracted.exe.5650000.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.03_extracted.exe.5650000.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.03_extracted.exe.5650000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.03_extracted.exe.5650000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.03_extracted.exe.4c88090.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.03_extracted.exe.4c88090.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.03_extracted.exe.2db12e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.03_extracted.exe.4a679c8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.03_extracted.exe.4a679c8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.03_extracted.exe.4b68c38.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.03_extracted.exe.4b68c38.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 03_extracted.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: LiydYED.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 6.2.03_extracted.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 6.2.03_extracted.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 6.2.03_extracted.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@6/4@9/2
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_077A27D2 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_077A279B AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_05040F2A AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_05040EF3 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\03_extracted.exeFile created: C:\Users\user\AppData\Roaming\LiydYED.exeJump to behavior
        Source: C:\Users\user\Desktop\03_extracted.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Users\user\Desktop\03_extracted.exeMutant created: \Sessions\1\BaseNamedObjects\lsPvaxhQEBvPAUaKmBBEq
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5476:120:WilError_01
        Source: C:\Users\user\Desktop\03_extracted.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{c687c38e-2b2d-4d96-b5eb-9a31ccba603d}
        Source: C:\Users\user\Desktop\03_extracted.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE7C8.tmpJump to behavior
        Source: 03_extracted.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\03_extracted.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\03_extracted.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\03_extracted.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\03_extracted.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\03_extracted.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\03_extracted.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\03_extracted.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\03_extracted.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: 03_extracted.exeVirustotal: Detection: 41%
        Source: 03_extracted.exeReversingLabs: Detection: 41%
        Source: C:\Users\user\Desktop\03_extracted.exeFile read: C:\Users\user\Desktop\03_extracted.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\03_extracted.exe 'C:\Users\user\Desktop\03_extracted.exe'
        Source: C:\Users\user\Desktop\03_extracted.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LiydYED' /XML 'C:\Users\user\AppData\Local\Temp\tmpE7C8.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\03_extracted.exeProcess created: C:\Users\user\Desktop\03_extracted.exe {path}
        Source: C:\Users\user\Desktop\03_extracted.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LiydYED' /XML 'C:\Users\user\AppData\Local\Temp\tmpE7C8.tmp'
        Source: C:\Users\user\Desktop\03_extracted.exeProcess created: C:\Users\user\Desktop\03_extracted.exe {path}
        Source: C:\Users\user\Desktop\03_extracted.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
        Source: C:\Users\user\Desktop\03_extracted.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: 03_extracted.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: C:\Users\user\Desktop\03_extracted.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: 03_extracted.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: 03_extracted.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: mscorrc.pdb source: 03_extracted.exe, 00000000.00000002.261775568.0000000007810000.00000002.00000001.sdmp, 03_extracted.exe, 00000006.00000002.497026294.00000000051D0000.00000002.00000001.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 03_extracted.exe, MainForm.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: LiydYED.exe.0.dr, MainForm.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.03_extracted.exe.fb0000.0.unpack, MainForm.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.03_extracted.exe.fb0000.0.unpack, MainForm.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.2.03_extracted.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.2.03_extracted.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.0.03_extracted.exe.680000.0.unpack, MainForm.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.2.03_extracted.exe.680000.1.unpack, MainForm.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 03_extracted.exeStatic PE information: 0xE963C9E9 [Fri Jan 29 19:18:01 2094 UTC]
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C285F8 pushfd ; retf
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_01C2DA2A push E9FFFFFFh; iretd
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_00F12BBD push cs; ret
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_00F12BEC push cs; ret
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_00F29D30 pushad ; retf
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_00F29D2C push eax; retf
        Source: initial sampleStatic PE information: section name: .text entropy: 7.33039162712
        Source: initial sampleStatic PE information: section name: .text entropy: 7.33039162712
        Source: 6.2.03_extracted.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 6.2.03_extracted.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\03_extracted.exeFile created: C:\Users\user\AppData\Roaming\LiydYED.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\03_extracted.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LiydYED' /XML 'C:\Users\user\AppData\Local\Temp\tmpE7C8.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\03_extracted.exeFile opened: C:\Users\user\Desktop\03_extracted.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: Process Memory Space: 03_extracted.exe PID: 5976, type: MEMORY
        Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)Show sources
        Source: C:\Users\user\Desktop\03_extracted.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: 03_extracted.exe, 00000000.00000002.248945960.00000000038E1000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: 03_extracted.exe, 00000000.00000002.248945960.00000000038E1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\03_extracted.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier
        Source: C:\Users\user\Desktop\03_extracted.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
        Source: C:\Users\user\Desktop\03_extracted.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
        Source: C:\Users\user\Desktop\03_extracted.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\03_extracted.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum name: 0
        Source: C:\Users\user\Desktop\03_extracted.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
        Source: C:\Users\user\Desktop\03_extracted.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\03_extracted.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\03_extracted.exeWindow / User API: threadDelayed 386
        Source: C:\Users\user\Desktop\03_extracted.exeWindow / User API: foregroundWindowGot 982
        Source: C:\Users\user\Desktop\03_extracted.exe TID: 484Thread sleep time: -31500s >= -30000s
        Source: C:\Users\user\Desktop\03_extracted.exe TID: 5308Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\03_extracted.exe TID: 5552Thread sleep time: -1844674407370954s >= -30000s
        Source: C:\Users\user\Desktop\03_extracted.exe TID: 5552Thread sleep count: 177 > 30
        Source: C:\Users\user\Desktop\03_extracted.exe TID: 5552Thread sleep count: 340 > 30
        Source: C:\Users\user\Desktop\03_extracted.exe TID: 2832Thread sleep count: 386 > 30
        Source: C:\Users\user\Desktop\03_extracted.exe TID: 5552Thread sleep count: 42 > 30
        Source: C:\Users\user\Desktop\03_extracted.exe TID: 5552Thread sleep count: 39 > 30
        Source: C:\Users\user\Desktop\03_extracted.exe TID: 2200Thread sleep time: -240000s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_05040BB6 GetSystemInfo,
        Source: C:\Users\user\Desktop\03_extracted.exeThread delayed: delay time: 31500
        Source: C:\Users\user\Desktop\03_extracted.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\03_extracted.exeThread delayed: delay time: 922337203685477
        Source: 03_extracted.exe, 00000000.00000002.248085000.0000000001777000.00000004.00000001.sdmpBinary or memory string: VMware
        Source: 03_extracted.exe, 00000000.00000002.248945960.00000000038E1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
        Source: 03_extracted.exe, 00000006.00000002.497327707.0000000005500000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: 03_extracted.exe, 00000000.00000002.248945960.00000000038E1000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: 03_extracted.exe, 00000000.00000002.248945960.00000000038E1000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: 03_extracted.exe, 00000000.00000002.248945960.00000000038E1000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: 03_extracted.exe, 00000000.00000002.248945960.00000000038E1000.00000004.00000001.sdmpBinary or memory string: (r#"SOFTWARE\VMware, Inc.\VMware Tools
        Source: 03_extracted.exe, 00000000.00000002.248945960.00000000038E1000.00000004.00000001.sdmpBinary or memory string: (r&%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: 03_extracted.exe, 00000000.00000002.248085000.0000000001777000.00000004.00000001.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwarePOM8ROR6Win32_VideoControllerCG2C6NP_VideoController120060621000000.000000-00078815997display.infMSBDA59MHOK6SPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsL_AN_91M(U
        Source: 03_extracted.exe, 00000000.00000002.248945960.00000000038E1000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: 03_extracted.exe, 00000000.00000002.248945960.00000000038E1000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: 03_extracted.exe, 00000006.00000002.497327707.0000000005500000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: 03_extracted.exe, 00000006.00000002.497327707.0000000005500000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: 03_extracted.exe, 00000000.00000002.248945960.00000000038E1000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: 03_extracted.exe, 00000000.00000002.248945960.00000000038E1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: 03_extracted.exe, 00000000.00000002.248945960.00000000038E1000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: 03_extracted.exe, 00000006.00000002.497327707.0000000005500000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\03_extracted.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\03_extracted.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\03_extracted.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\03_extracted.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\03_extracted.exeMemory written: C:\Users\user\Desktop\03_extracted.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\03_extracted.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LiydYED' /XML 'C:\Users\user\AppData\Local\Temp\tmpE7C8.tmp'
        Source: C:\Users\user\Desktop\03_extracted.exeProcess created: C:\Users\user\Desktop\03_extracted.exe {path}
        Source: 03_extracted.exe, 00000006.00000003.361963605.00000000060AD000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: 03_extracted.exe, 00000006.00000002.492878895.0000000001410000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: 03_extracted.exe, 00000006.00000002.492878895.0000000001410000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: 03_extracted.exe, 00000006.00000002.492878895.0000000001410000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
        Source: 03_extracted.exe, 00000006.00000002.495587124.0000000002E5A000.00000004.00000001.sdmpBinary or memory string: Program Managerp
        Source: 03_extracted.exe, 00000006.00000002.495587124.0000000002E5A000.00000004.00000001.sdmpBinary or memory string: Program Manager0
        Source: 03_extracted.exe, 00000006.00000002.492878895.0000000001410000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
        Source: 03_extracted.exe, 00000006.00000002.492878895.0000000001410000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: 03_extracted.exe, 00000006.00000002.495587124.0000000002E5A000.00000004.00000001.sdmpBinary or memory string: Program Manager`p
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 0_2_077A1382 GetUserNameA,
        Source: C:\Users\user\Desktop\03_extracted.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000006.00000002.489322816.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.496381211.0000000003DE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.497557539.0000000005650000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.252199912.00000000048E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 03_extracted.exe PID: 5976, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 03_extracted.exe PID: 5548, type: MEMORY
        Source: Yara matchFile source: 6.2.03_extracted.exe.3dee43c.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.5654629.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.3dee43c.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4b68c38.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.3de9606.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.3df2a65.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.5650000.12.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.5650000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4c88090.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4a679c8.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4b68c38.2.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: 03_extracted.exe, 00000000.00000002.252199912.00000000048E1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 03_extracted.exe, 00000006.00000002.489322816.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 03_extracted.exe, 00000006.00000002.494608328.0000000002DA1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000006.00000002.489322816.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.496381211.0000000003DE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.497557539.0000000005650000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.252199912.00000000048E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 03_extracted.exe PID: 5976, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 03_extracted.exe PID: 5548, type: MEMORY
        Source: Yara matchFile source: 6.2.03_extracted.exe.3dee43c.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.5654629.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.3dee43c.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4b68c38.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.3de9606.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.3df2a65.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.5650000.12.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.03_extracted.exe.5650000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4c88090.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4a679c8.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.03_extracted.exe.4b68c38.2.raw.unpack, type: UNPACKEDPE
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_0504247A bind,
        Source: C:\Users\user\Desktop\03_extracted.exeCode function: 6_2_05042428 bind,

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Access Token Manipulation1Disable or Modify Tools1Input Capture11Account Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsProcess Injection112Deobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Obfuscated Files or Information2Security Account ManagerSystem Information Discovery13SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing13NTDSSecurity Software Discovery311Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptTimestomp1LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsVirtualization/Sandbox Evasion131VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion131DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection112/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
        Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        03_extracted.exe41%VirustotalBrowse
        03_extracted.exe41%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\LiydYED.exe41%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        6.2.03_extracted.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        6.2.03_extracted.exe.5650000.12.unpack100%AviraTR/NanoCore.fadteDownload File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/a-e0%Avira URL Cloudsafe
        http://www.sandoll.co.krense0%Avira URL Cloudsafe
        http://www.tiro.com.0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.fontbureau.comgrita0%URL Reputationsafe
        http://www.fontbureau.comgrita0%URL Reputationsafe
        http://www.fontbureau.comgrita0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/a-e$0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.sajatypeworks.comhe0%Avira URL Cloudsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.founder.com.cn/cng0%Avira URL Cloudsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.founder.com.cn/cne0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnLog0%Avira URL Cloudsafe
        http://www.sandoll.co.krt0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.sajatypeworks.com-d0%Avira URL Cloudsafe
        http://www.fonts.comlo0%Avira URL Cloudsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/;0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/;0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/;0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/s0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/s0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/s0%URL Reputationsafe
        http://www.fontbureau.comt0%URL Reputationsafe
        http://www.fontbureau.comt0%URL Reputationsafe
        http://www.fontbureau.comt0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/ita0%Avira URL Cloudsafe
        http://www.fontbureau.como0%URL Reputationsafe
        http://www.fontbureau.como0%URL Reputationsafe
        http://www.fontbureau.como0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/-0%Avira URL Cloudsafe
        http://www.fonts.com00%Avira URL Cloudsafe
        http://www.founder.com.cn/cnk-s0%Avira URL Cloudsafe
        http://www.tiro.comc0%URL Reputationsafe
        http://www.tiro.comc0%URL Reputationsafe
        http://www.tiro.comc0%URL Reputationsafe
        http://www.founder.com.cn/cn#0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        sys2021.linkpc.net
        79.137.109.121
        truefalse
          high

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          true
          • Avira URL Cloud: safe
          low
          sys2021.linkpc.netfalse
            high

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.fontbureau.com/designersG03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
              high
              http://www.fontbureau.com/designers/?03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                high
                http://www.founder.com.cn/cn/bThe03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/a-e03_extracted.exe, 00000000.00000003.226058625.0000000005AA4000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designers?03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                  high
                  http://www.sandoll.co.krense03_extracted.exe, 00000000.00000003.224075054.0000000005AA6000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.tiro.com.03_extracted.exe, 00000000.00000003.223493292.0000000005ABB000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.tiro.com03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmp, 03_extracted.exe, 00000000.00000003.223530764.0000000005ABB000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmp, 03_extracted.exe, 00000000.00000003.228394931.0000000005AAD000.00000004.00000001.sdmpfalse
                    high
                    http://www.goodfont.co.kr03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.com03_extracted.exe, 00000000.00000003.223195518.0000000005ABB000.00000004.00000001.sdmp, 03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netD03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/cThe03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htm03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.com03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.comgrita03_extracted.exe, 00000000.00000002.254191981.0000000005AA0000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/a-e$03_extracted.exe, 00000000.00000003.226058625.0000000005AA4000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.galapagosdesign.com/DPlease03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.comhe03_extracted.exe, 00000000.00000003.223195518.0000000005ABB000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fonts.com03_extracted.exe, 00000000.00000003.223324934.0000000005ABB000.00000004.00000001.sdmpfalse
                      high
                      http://www.sandoll.co.kr03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.urwpp.deDPlease03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.zhongyicts.com.cn03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cng03_extracted.exe, 00000000.00000003.224439658.0000000005ADD000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.sakkal.com03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cne03_extracted.exe, 00000000.00000003.224684993.0000000005AA4000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.003_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                        high
                        http://www.fontbureau.com03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                          high
                          http://www.founder.com.cn/cnLog03_extracted.exe, 00000000.00000003.224684993.0000000005AA4000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.sandoll.co.krt03_extracted.exe, 00000000.00000003.224075054.0000000005AA6000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/jp/03_extracted.exe, 00000000.00000003.226058625.0000000005AA4000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.sajatypeworks.com-d03_extracted.exe, 00000000.00000003.223195518.0000000005ABB000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fonts.comlo03_extracted.exe, 00000000.00000003.223286632.0000000005ABB000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.carterandcone.coml03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/;03_extracted.exe, 00000000.00000003.226058625.0000000005AA4000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmlN03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                            high
                            http://www.founder.com.cn/cn03_extracted.exe, 00000000.00000003.225848525.0000000005AAC000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-jones.html03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                              high
                              http://www.jiyu-kobo.co.jp/s03_extracted.exe, 00000000.00000003.226058625.0000000005AA4000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comt03_extracted.exe, 00000000.00000002.254191981.0000000005AA0000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/03_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/ita03_extracted.exe, 00000000.00000003.226058625.0000000005AA4000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.como03_extracted.exe, 00000000.00000002.254191981.0000000005AA0000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/jp/-03_extracted.exe, 00000000.00000003.226058625.0000000005AA4000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.com/designers803_extracted.exe, 00000000.00000002.254230229.0000000005B90000.00000002.00000001.sdmpfalse
                                high
                                http://www.fonts.com003_extracted.exe, 00000000.00000003.223303861.0000000005ABB000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.founder.com.cn/cnk-s03_extracted.exe, 00000000.00000003.224439658.0000000005ADD000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.tiro.comc03_extracted.exe, 00000000.00000003.223512202.0000000005ABB000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cn#03_extracted.exe, 00000000.00000003.224453104.0000000005AA4000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.com/designers403_extracted.exe, 00000000.00000003.228394931.0000000005AAD000.00000004.00000001.sdmpfalse
                                  high

                                  Contacted IPs

                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs

                                  Public

                                  IPDomainCountryFlagASNASN NameMalicious
                                  191.96.25.26
                                  unknownChile
                                  40676AS40676USfalse
                                  79.137.109.121
                                  sys2021.linkpc.netFrance
                                  16276OVHFRfalse

                                  General Information

                                  Joe Sandbox Version:32.0.0 Black Diamond
                                  Analysis ID:412751
                                  Start date:12.05.2021
                                  Start time:22:39:18
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 8m 0s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:03_extracted.exe
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:29
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@6/4@9/2
                                  EGA Information:Failed
                                  HDC Information:
                                  • Successful, ratio: 0.1% (good quality ratio 0%)
                                  • Quality average: 0%
                                  • Quality standard deviation: 0%
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Found application associated with file extension: .exe
                                  Warnings:
                                  Show All
                                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                  • TCP Packets have been reduced to 100
                                  • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 13.64.90.137, 20.82.209.183, 93.184.220.29, 184.30.21.144, 104.43.193.48, 23.57.80.111, 20.49.157.6, 92.122.213.247, 92.122.213.194, 2.20.142.209, 2.20.143.16, 20.54.26.129, 20.50.102.62
                                  • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, cs9.wac.phicdn.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, skypedataprdcolwus17.cloudapp.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.

                                  Simulations

                                  Behavior and APIs

                                  TimeTypeDescription
                                  22:40:14API Interceptor945x Sleep call for process: 03_extracted.exe modified

                                  Joe Sandbox View / Context

                                  IPs

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  191.96.25.26Invoice No F1019855_PDF.vbsGet hashmaliciousBrowse
                                    Invoice No F1019855_PDF.vbsGet hashmaliciousBrowse
                                      Spec_PDF.vbsGet hashmaliciousBrowse
                                        SpecPDF.vbsGet hashmaliciousBrowse
                                          79.137.109.121Invoice No F1019855_PDF.vbsGet hashmaliciousBrowse
                                            Transcation03232016646pdf.exeGet hashmaliciousBrowse
                                              NEW SC #ORDER.exeGet hashmaliciousBrowse
                                                NEW SC #ORDER.exeGet hashmaliciousBrowse
                                                  NEW SC.exeGet hashmaliciousBrowse
                                                    NEW SC.exeGet hashmaliciousBrowse

                                                      Domains

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      sys2021.linkpc.netInvoice No F1019855_PDF.vbsGet hashmaliciousBrowse
                                                      • 87.98.245.48
                                                      Invoice No F1019855_PDF.vbsGet hashmaliciousBrowse
                                                      • 79.137.109.121
                                                      Spec_PDF.vbsGet hashmaliciousBrowse
                                                      • 105.112.11.245
                                                      SpecPDF.vbsGet hashmaliciousBrowse
                                                      • 179.43.166.32

                                                      ASN

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      AS40676US0987654332.exeGet hashmaliciousBrowse
                                                      • 107.160.232.135
                                                      POI09876OIUY.exeGet hashmaliciousBrowse
                                                      • 107.160.232.135
                                                      Invoice No F1019855_PDF.vbsGet hashmaliciousBrowse
                                                      • 191.96.25.26
                                                      GLqbDRKePPp16Zr.exeGet hashmaliciousBrowse
                                                      • 107.160.234.116
                                                      f41e9f9d_by_Libranalysis.exeGet hashmaliciousBrowse
                                                      • 107.160.177.197
                                                      Invoice No F1019855_PDF.vbsGet hashmaliciousBrowse
                                                      • 191.96.25.26
                                                      2f50000.exeGet hashmaliciousBrowse
                                                      • 38.39.192.78
                                                      PT6-1152.docGet hashmaliciousBrowse
                                                      • 45.61.136.72
                                                      PT6-1152.docGet hashmaliciousBrowse
                                                      • 45.61.136.72
                                                      wMqdemYyHm.exeGet hashmaliciousBrowse
                                                      • 104.217.141.249
                                                      70pGP1JaCf6M0kf.exeGet hashmaliciousBrowse
                                                      • 107.160.232.135
                                                      Spec_PDF.vbsGet hashmaliciousBrowse
                                                      • 191.96.25.26
                                                      8CgG2kY3Ow.dllGet hashmaliciousBrowse
                                                      • 45.61.138.153
                                                      DHL_S390201.exeGet hashmaliciousBrowse
                                                      • 45.34.249.30
                                                      978463537_BL FOR APPROVAL.docGet hashmaliciousBrowse
                                                      • 45.34.114.71
                                                      SpecPDF.vbsGet hashmaliciousBrowse
                                                      • 191.96.25.26
                                                      7mB68AZqJs.exeGet hashmaliciousBrowse
                                                      • 104.217.143.44
                                                      q3uHPdoxWP.exeGet hashmaliciousBrowse
                                                      • 172.107.55.6
                                                      NMpDBwHJP8.exeGet hashmaliciousBrowse
                                                      • 172.107.55.6
                                                      OrSxEMsYDA.exeGet hashmaliciousBrowse
                                                      • 107.160.118.15
                                                      OVHFRhLrFhmoMMg.exeGet hashmaliciousBrowse
                                                      • 51.195.61.169
                                                      350969bc_by_Libranalysis.exeGet hashmaliciousBrowse
                                                      • 51.222.80.112
                                                      Copy-384955799-05102021.xlsmGet hashmaliciousBrowse
                                                      • 167.114.48.59
                                                      Copy-384955799-05102021.xlsmGet hashmaliciousBrowse
                                                      • 167.114.48.59
                                                      Copy-384955799-05102021.xlsmGet hashmaliciousBrowse
                                                      • 167.114.48.59
                                                      DHL_Shipment11052021pdf.exeGet hashmaliciousBrowse
                                                      • 51.210.201.99
                                                      A6FAm1ae1j.exeGet hashmaliciousBrowse
                                                      • 217.182.77.10
                                                      INV74321.exeGet hashmaliciousBrowse
                                                      • 87.98.148.38
                                                      aa04cdcc_by_Libranalysis.exeGet hashmaliciousBrowse
                                                      • 46.105.217.100
                                                      correct invoice.exeGet hashmaliciousBrowse
                                                      • 213.186.33.5
                                                      Kb0p7FYmN0yNdzP.exeGet hashmaliciousBrowse
                                                      • 66.70.204.222
                                                      551f47ac_by_Libranalysis.xlsmGet hashmaliciousBrowse
                                                      • 193.70.33.51
                                                      guluh4pYFQybxL8.exeGet hashmaliciousBrowse
                                                      • 66.70.204.222
                                                      qA9D8QVC4LrzlPR.exeGet hashmaliciousBrowse
                                                      • 66.70.204.222
                                                      OLy4KI85kB3HENF.exeGet hashmaliciousBrowse
                                                      • 66.70.204.222
                                                      generated purchase order 6149057.xlsmGet hashmaliciousBrowse
                                                      • 158.69.48.225
                                                      scan of document 5336227.xlsmGet hashmaliciousBrowse
                                                      • 145.239.93.251
                                                      67w7Ez6lvb.exeGet hashmaliciousBrowse
                                                      • 91.121.251.178
                                                      generated check 8460.xlsmGet hashmaliciousBrowse
                                                      • 145.239.93.251
                                                      export of bill 896621.xlsmGet hashmaliciousBrowse
                                                      • 193.70.33.51

                                                      JA3 Fingerprints

                                                      No context

                                                      Dropped Files

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      C:\Users\user\AppData\Roaming\LiydYED.exeInvoice No F1019855_PDF.vbsGet hashmaliciousBrowse

                                                        Created / dropped Files

                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\03_extracted.exe.log
                                                        Process:C:\Users\user\Desktop\03_extracted.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):655
                                                        Entropy (8bit):5.273171405160065
                                                        Encrypted:false
                                                        SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9t0U2WUXBQav:MLF20NaL329hJ5g522rWz2p29XBT
                                                        MD5:2703120C370FBB4A8BA08C6D1754039E
                                                        SHA1:EC0DB47BF00A4A828F796147619386C0BBEA66A1
                                                        SHA-256:F95566974BC44F3A757CAFB1456D185D8F333AC84775089DE18310B90C18B1BC
                                                        SHA-512:BC05A2A1BE5B122FC6D3DEA66EF4258522F13351B9754378395AAD019631E312CFD3BC990F3E3D5C7BB0BDBA1EAD54A2B34A96DEE2FCCD703721E98F6192ED48
                                                        Malicious:true
                                                        Reputation:moderate, very likely benign file
                                                        Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\4de99804c29261edb63c93616550f034\System.Management.ni.dll",0..
                                                        C:\Users\user\AppData\Local\Temp\tmpE7C8.tmp
                                                        Process:C:\Users\user\Desktop\03_extracted.exe
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1644
                                                        Entropy (8bit):5.168034599644377
                                                        Encrypted:false
                                                        SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBhtn:cbhC7ZlNQF/rydbz9I3YODOLNdq3d
                                                        MD5:774DF64BD8637D20678EC5B636C078F6
                                                        SHA1:027CD9FEB42E61AF4A6A7E4C13F7835CC9FAB454
                                                        SHA-256:5B86A79F159C9724A9AC8BCE9E68D56FB54092931B5656B626D19AAE1D68929B
                                                        SHA-512:87EF5A78C8A50A3D98F72B229E5B4C6FA23198E572C03723345FB7CCE7001753D073085D8A3F09E2196F610EA4606FE4378262F97A7BC8358BE04B4D78194DC7
                                                        Malicious:true
                                                        Reputation:low
                                                        Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                        Process:C:\Users\user\Desktop\03_extracted.exe
                                                        File Type:International EBCDIC text, with NEL line terminators
                                                        Category:dropped
                                                        Size (bytes):8
                                                        Entropy (8bit):3.0
                                                        Encrypted:false
                                                        SSDEEP:3:gw8n:gj
                                                        MD5:D24B6D1F3C25FABB06DAD0E517C8684F
                                                        SHA1:A8BA98E9F68D2563C94CBAE5D26B7C4DFE5AD3F2
                                                        SHA-256:BB554C96F80D4024210AA29BABC04017C642382793EAE8992541466E7A9ECDAF
                                                        SHA-512:E8FE15EDABC35C61D88243C39FF0C174D0BA0AC065A0908270D31672B208046C181BEC769654614D40635625CCFE7D659997E4B6651795AC4189BB46B42BEE99
                                                        Malicious:true
                                                        Reputation:low
                                                        Preview: .e....H
                                                        C:\Users\user\AppData\Roaming\LiydYED.exe
                                                        Process:C:\Users\user\Desktop\03_extracted.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):784896
                                                        Entropy (8bit):7.328703413450174
                                                        Encrypted:false
                                                        SSDEEP:12288:OoLLoS60/K7yh036vCww4Scd3IGj483ESuvkuDKsjLtZTMfLodiMW2G:OoLA3AScdYKSvkItxeUdinh
                                                        MD5:43C4F163196FF02E7AA8C5040375FDA4
                                                        SHA1:F826B410B31CB251DD85F3663735B2F410906517
                                                        SHA-256:A585841F956F17925242996A98836B0D08767DDB179B4B41FD18A5DE719C531C
                                                        SHA-512:264FB4514257080068CEC2915BE6F81EA759812F059B9B969B2F40EE6E502497F22F66C0EFE9B2F5736D6C61F1C7967E9F801B1DF33D100261D4A1B560DDEF7E
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 41%
                                                        Joe Sandbox View:
                                                        • Filename: Invoice No F1019855_PDF.vbs, Detection: malicious, Browse
                                                        Reputation:low
                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....c...............0.............:.... ... ....@.. .......................`............@.....................................O.... .......................@....................................................... ............... ..H............text...@.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H........e..,~......v...$....)...........................................0...........r...p.+..*..0...........r...p.+..*".(.....*.0..C........(L...&............(....h}........( ...h}.......(!... ......(V...&*>...("...(.....*..0..C........(L...&............(....h}........( ...h}.......(!... ......(V...&*>...("...(.....*..0..2..........(#.....($........,...(!......(%....(&...(.....*>...("...(.....*...0................b`.+..*...(!... .......(....h..( ...h(....(Q...&*..0..........

                                                        Static File Info

                                                        General

                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Entropy (8bit):7.328703413450174
                                                        TrID:
                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                        • Windows Screen Saver (13104/52) 0.07%
                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                        File name:03_extracted.exe
                                                        File size:784896
                                                        MD5:43c4f163196ff02e7aa8c5040375fda4
                                                        SHA1:f826b410b31cb251dd85f3663735b2f410906517
                                                        SHA256:a585841f956f17925242996a98836b0d08767ddb179b4b41fd18a5de719c531c
                                                        SHA512:264fb4514257080068cec2915be6f81ea759812f059b9b969b2f40ee6e502497f22f66c0efe9b2f5736d6c61f1c7967e9f801b1df33d100261d4a1b560ddef7e
                                                        SSDEEP:12288:OoLLoS60/K7yh036vCww4Scd3IGj483ESuvkuDKsjLtZTMfLodiMW2G:OoLA3AScdYKSvkItxeUdinh
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....c...............0.............:.... ... ....@.. .......................`............@................................

                                                        File Icon

                                                        Icon Hash:00828e8e8686b000

                                                        Static PE Info

                                                        General

                                                        Entrypoint:0x4c0e3a
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                        Time Stamp:0xE963C9E9 [Fri Jan 29 19:18:01 2094 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:v2.0.50727
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                        Entrypoint Preview

                                                        Instruction
                                                        jmp dword ptr [00402000h]
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al

                                                        Data Directories

                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc0de80x4f.text
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc20000x5b4.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xc40000xc.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xc0dcc0x1c.text
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                        Sections

                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x20000xbee400xbf000False0.734753354058data7.33039162712IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                        .rsrc0xc20000x5b40x600False0.422526041667data4.1233888382IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0xc40000xc0x200False0.041015625data0.0776331623432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                        Resources

                                                        NameRVASizeTypeLanguageCountry
                                                        RT_VERSION0xc20900x324data
                                                        RT_MANIFEST0xc23c40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                        Imports

                                                        DLLImport
                                                        mscoree.dll_CorExeMain

                                                        Version Infos

                                                        DescriptionData
                                                        Translation0x0000 0x04b0
                                                        LegalCopyrightCopyright 2021
                                                        Assembly Version1.0.0.0
                                                        InternalNameMXvDG34.exe
                                                        FileVersion1.0.0.0
                                                        CompanyName
                                                        LegalTrademarks
                                                        Comments
                                                        ProductNameHandle Leaker
                                                        ProductVersion1.0.0.0
                                                        FileDescriptionHandle Leaker
                                                        OriginalFilenameMXvDG34.exe

                                                        Network Behavior

                                                        Network Port Distribution

                                                        TCP Packets

                                                        TimestampSource PortDest PortSource IPDest IP
                                                        May 12, 2021 22:40:20.181857109 CEST4970811940192.168.2.579.137.109.121
                                                        May 12, 2021 22:40:20.394779921 CEST119404970879.137.109.121192.168.2.5
                                                        May 12, 2021 22:40:20.950453043 CEST4970811940192.168.2.579.137.109.121
                                                        May 12, 2021 22:40:21.189028025 CEST119404970879.137.109.121192.168.2.5
                                                        May 12, 2021 22:40:21.841078997 CEST4970811940192.168.2.579.137.109.121
                                                        May 12, 2021 22:40:22.051414013 CEST119404970879.137.109.121192.168.2.5
                                                        May 12, 2021 22:40:26.391540051 CEST4971111940192.168.2.579.137.109.121
                                                        May 12, 2021 22:40:26.647887945 CEST119404971179.137.109.121192.168.2.5
                                                        May 12, 2021 22:40:27.153624058 CEST4971111940192.168.2.579.137.109.121
                                                        May 12, 2021 22:40:27.435940027 CEST119404971179.137.109.121192.168.2.5
                                                        May 12, 2021 22:40:27.950536013 CEST4971111940192.168.2.579.137.109.121
                                                        May 12, 2021 22:40:28.265122890 CEST119404971179.137.109.121192.168.2.5
                                                        May 12, 2021 22:40:32.368869066 CEST4971311940192.168.2.579.137.109.121
                                                        May 12, 2021 22:40:32.684233904 CEST119404971379.137.109.121192.168.2.5
                                                        May 12, 2021 22:40:33.275163889 CEST4971311940192.168.2.579.137.109.121
                                                        May 12, 2021 22:40:33.567784071 CEST119404971379.137.109.121192.168.2.5
                                                        May 12, 2021 22:40:34.169770002 CEST4971311940192.168.2.579.137.109.121
                                                        May 12, 2021 22:40:34.445559025 CEST119404971379.137.109.121192.168.2.5
                                                        May 12, 2021 22:40:38.557212114 CEST4971611940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:40:38.746800900 CEST1194049716191.96.25.26192.168.2.5
                                                        May 12, 2021 22:40:39.342087984 CEST4971611940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:40:39.532274008 CEST1194049716191.96.25.26192.168.2.5
                                                        May 12, 2021 22:40:40.045340061 CEST4971611940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:40:40.235362053 CEST1194049716191.96.25.26192.168.2.5
                                                        May 12, 2021 22:40:44.265254021 CEST4971711940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:40:44.454807997 CEST1194049717191.96.25.26192.168.2.5
                                                        May 12, 2021 22:40:45.155085087 CEST4971711940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:40:45.344358921 CEST1194049717191.96.25.26192.168.2.5
                                                        May 12, 2021 22:40:45.952081919 CEST4971711940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:40:46.143121004 CEST1194049717191.96.25.26192.168.2.5
                                                        May 12, 2021 22:40:50.316963911 CEST4971811940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:40:50.506433010 CEST1194049718191.96.25.26192.168.2.5
                                                        May 12, 2021 22:40:51.155723095 CEST4971811940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:40:51.345418930 CEST1194049718191.96.25.26192.168.2.5
                                                        May 12, 2021 22:40:51.952533960 CEST4971811940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:40:52.142770052 CEST1194049718191.96.25.26192.168.2.5
                                                        May 12, 2021 22:40:56.248692036 CEST4972111940192.168.2.579.137.109.121
                                                        May 12, 2021 22:40:56.577107906 CEST119404972179.137.109.121192.168.2.5
                                                        May 12, 2021 22:40:57.172049999 CEST4972111940192.168.2.579.137.109.121
                                                        May 12, 2021 22:40:57.421186924 CEST119404972179.137.109.121192.168.2.5
                                                        May 12, 2021 22:40:57.984330893 CEST4972111940192.168.2.579.137.109.121
                                                        May 12, 2021 22:40:58.203782082 CEST119404972179.137.109.121192.168.2.5
                                                        May 12, 2021 22:41:02.311530113 CEST4972211940192.168.2.579.137.109.121
                                                        May 12, 2021 22:41:02.654825926 CEST119404972279.137.109.121192.168.2.5
                                                        May 12, 2021 22:41:03.156591892 CEST4972211940192.168.2.579.137.109.121
                                                        May 12, 2021 22:41:03.392868042 CEST119404972279.137.109.121192.168.2.5
                                                        May 12, 2021 22:41:03.906749010 CEST4972211940192.168.2.579.137.109.121
                                                        May 12, 2021 22:41:04.130737066 CEST119404972279.137.109.121192.168.2.5
                                                        May 12, 2021 22:41:08.254611969 CEST4972411940192.168.2.579.137.109.121
                                                        May 12, 2021 22:41:08.598133087 CEST119404972479.137.109.121192.168.2.5
                                                        May 12, 2021 22:41:09.110224962 CEST4972411940192.168.2.579.137.109.121
                                                        May 12, 2021 22:41:09.371365070 CEST119404972479.137.109.121192.168.2.5
                                                        May 12, 2021 22:41:09.876256943 CEST4972411940192.168.2.579.137.109.121
                                                        May 12, 2021 22:41:10.128433943 CEST119404972479.137.109.121192.168.2.5
                                                        May 12, 2021 22:41:14.143450975 CEST4972711940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:41:14.332782984 CEST1194049727191.96.25.26192.168.2.5
                                                        May 12, 2021 22:41:14.845030069 CEST4972711940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:41:15.034599066 CEST1194049727191.96.25.26192.168.2.5
                                                        May 12, 2021 22:41:15.548228979 CEST4972711940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:41:15.738030910 CEST1194049727191.96.25.26192.168.2.5
                                                        May 12, 2021 22:41:19.753288984 CEST4973311940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:41:19.942635059 CEST1194049733191.96.25.26192.168.2.5
                                                        May 12, 2021 22:41:20.454910994 CEST4973311940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:41:20.644310951 CEST1194049733191.96.25.26192.168.2.5
                                                        May 12, 2021 22:41:21.158118963 CEST4973311940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:41:21.348942995 CEST1194049733191.96.25.26192.168.2.5
                                                        May 12, 2021 22:41:25.364053965 CEST4973411940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:41:25.555480003 CEST1194049734191.96.25.26192.168.2.5
                                                        May 12, 2021 22:41:26.064924955 CEST4973411940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:41:26.254933119 CEST1194049734191.96.25.26192.168.2.5
                                                        May 12, 2021 22:41:26.768134117 CEST4973411940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:41:26.958157063 CEST1194049734191.96.25.26192.168.2.5
                                                        May 12, 2021 22:41:32.345263004 CEST4973511940192.168.2.579.137.109.121
                                                        May 12, 2021 22:41:32.657366991 CEST119404973579.137.109.121192.168.2.5
                                                        May 12, 2021 22:41:33.159749031 CEST4973511940192.168.2.579.137.109.121
                                                        May 12, 2021 22:41:39.159621954 CEST4973511940192.168.2.579.137.109.121
                                                        May 12, 2021 22:41:49.543638945 CEST4973711940192.168.2.579.137.109.121
                                                        May 12, 2021 22:41:49.747009993 CEST119404973779.137.109.121192.168.2.5
                                                        May 12, 2021 22:41:50.254332066 CEST4973711940192.168.2.579.137.109.121
                                                        May 12, 2021 22:41:50.544728994 CEST119404973779.137.109.121192.168.2.5
                                                        May 12, 2021 22:41:51.051290989 CEST4973711940192.168.2.579.137.109.121
                                                        May 12, 2021 22:41:51.286560059 CEST119404973779.137.109.121192.168.2.5
                                                        May 12, 2021 22:41:55.388365984 CEST4973911940192.168.2.579.137.109.121
                                                        May 12, 2021 22:41:55.648849964 CEST119404973979.137.109.121192.168.2.5
                                                        May 12, 2021 22:41:56.162950993 CEST4973911940192.168.2.579.137.109.121
                                                        May 12, 2021 22:41:56.385699034 CEST119404973979.137.109.121192.168.2.5
                                                        May 12, 2021 22:41:56.895621061 CEST4973911940192.168.2.579.137.109.121
                                                        May 12, 2021 22:41:57.121793985 CEST119404973979.137.109.121192.168.2.5
                                                        May 12, 2021 22:42:01.133452892 CEST4974011940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:42:01.322891951 CEST1194049740191.96.25.26192.168.2.5
                                                        May 12, 2021 22:42:01.833502054 CEST4974011940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:42:02.022944927 CEST1194049740191.96.25.26192.168.2.5
                                                        May 12, 2021 22:42:02.536616087 CEST4974011940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:42:02.726476908 CEST1194049740191.96.25.26192.168.2.5
                                                        May 12, 2021 22:42:06.742265940 CEST4974111940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:42:06.935261965 CEST1194049741191.96.25.26192.168.2.5
                                                        May 12, 2021 22:42:07.443434954 CEST4974111940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:42:07.636456013 CEST1194049741191.96.25.26192.168.2.5
                                                        May 12, 2021 22:42:08.146445036 CEST4974111940192.168.2.5191.96.25.26
                                                        May 12, 2021 22:42:08.339524031 CEST1194049741191.96.25.26192.168.2.5

                                                        UDP Packets

                                                        TimestampSource PortDest PortSource IPDest IP
                                                        May 12, 2021 22:39:59.130805016 CEST5430253192.168.2.58.8.8.8
                                                        May 12, 2021 22:39:59.170433998 CEST5378453192.168.2.58.8.8.8
                                                        May 12, 2021 22:39:59.195631027 CEST6530753192.168.2.58.8.8.8
                                                        May 12, 2021 22:39:59.198559999 CEST53543028.8.8.8192.168.2.5
                                                        May 12, 2021 22:39:59.219163895 CEST53537848.8.8.8192.168.2.5
                                                        May 12, 2021 22:39:59.253983021 CEST53653078.8.8.8192.168.2.5
                                                        May 12, 2021 22:39:59.303869009 CEST6434453192.168.2.58.8.8.8
                                                        May 12, 2021 22:39:59.355463982 CEST53643448.8.8.8192.168.2.5
                                                        May 12, 2021 22:39:59.490895987 CEST6206053192.168.2.58.8.8.8
                                                        May 12, 2021 22:39:59.549663067 CEST53620608.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:00.382235050 CEST6180553192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:00.430938005 CEST53618058.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:01.343189955 CEST5479553192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:01.402440071 CEST53547958.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:01.485665083 CEST4955753192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:01.534554005 CEST53495578.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:02.369940042 CEST6173353192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:02.418869972 CEST53617338.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:03.499629974 CEST6544753192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:03.548351049 CEST53654478.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:04.678842068 CEST5244153192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:04.737075090 CEST53524418.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:05.802606106 CEST6217653192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:05.851377010 CEST53621768.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:06.729510069 CEST5959653192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:06.778430939 CEST53595968.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:07.734236956 CEST6529653192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:07.786509037 CEST53652968.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:08.685148954 CEST6318353192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:08.735106945 CEST53631838.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:09.624185085 CEST6015153192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:09.675853968 CEST53601518.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:19.997391939 CEST5696953192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:20.157730103 CEST53569698.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:26.209935904 CEST5516153192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:26.390404940 CEST53551618.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:27.417108059 CEST5475753192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:27.476603031 CEST53547578.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:32.305219889 CEST4999253192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:32.367516041 CEST53499928.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:37.018873930 CEST6007553192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:37.093877077 CEST53600758.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:51.300076962 CEST5501653192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:51.362493038 CEST53550168.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:54.686959028 CEST6434553192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:54.748883963 CEST53643458.8.8.8192.168.2.5
                                                        May 12, 2021 22:40:56.189538002 CEST5712853192.168.2.58.8.8.8
                                                        May 12, 2021 22:40:56.247328043 CEST53571288.8.8.8192.168.2.5
                                                        May 12, 2021 22:41:02.251971960 CEST5479153192.168.2.58.8.8.8
                                                        May 12, 2021 22:41:02.310091972 CEST53547918.8.8.8192.168.2.5
                                                        May 12, 2021 22:41:03.510574102 CEST5046353192.168.2.58.8.8.8
                                                        May 12, 2021 22:41:03.661768913 CEST53504638.8.8.8192.168.2.5
                                                        May 12, 2021 22:41:08.195278883 CEST5039453192.168.2.58.8.8.8
                                                        May 12, 2021 22:41:08.252734900 CEST53503948.8.8.8192.168.2.5
                                                        May 12, 2021 22:41:12.564413071 CEST5853053192.168.2.58.8.8.8
                                                        May 12, 2021 22:41:12.630131960 CEST53585308.8.8.8192.168.2.5
                                                        May 12, 2021 22:41:15.441653013 CEST5381353192.168.2.58.8.8.8
                                                        May 12, 2021 22:41:15.506529093 CEST53538138.8.8.8192.168.2.5
                                                        May 12, 2021 22:41:32.280656099 CEST6373253192.168.2.58.8.8.8
                                                        May 12, 2021 22:41:32.342036963 CEST53637328.8.8.8192.168.2.5
                                                        May 12, 2021 22:41:48.390013933 CEST5734453192.168.2.58.8.8.8
                                                        May 12, 2021 22:41:48.462822914 CEST53573448.8.8.8192.168.2.5
                                                        May 12, 2021 22:41:49.484816074 CEST5445053192.168.2.58.8.8.8
                                                        May 12, 2021 22:41:49.542527914 CEST53544508.8.8.8192.168.2.5
                                                        May 12, 2021 22:41:50.027245045 CEST5926153192.168.2.58.8.8.8
                                                        May 12, 2021 22:41:50.084286928 CEST53592618.8.8.8192.168.2.5
                                                        May 12, 2021 22:41:55.326957941 CEST5715153192.168.2.58.8.8.8
                                                        May 12, 2021 22:41:55.386250973 CEST53571518.8.8.8192.168.2.5

                                                        DNS Queries

                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                        May 12, 2021 22:40:19.997391939 CEST192.168.2.58.8.8.80xe9bcStandard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                        May 12, 2021 22:40:26.209935904 CEST192.168.2.58.8.8.80x79c1Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                        May 12, 2021 22:40:32.305219889 CEST192.168.2.58.8.8.80x641cStandard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                        May 12, 2021 22:40:56.189538002 CEST192.168.2.58.8.8.80x6c41Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                        May 12, 2021 22:41:02.251971960 CEST192.168.2.58.8.8.80x3616Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                        May 12, 2021 22:41:08.195278883 CEST192.168.2.58.8.8.80x91cStandard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                        May 12, 2021 22:41:32.280656099 CEST192.168.2.58.8.8.80x4eddStandard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                        May 12, 2021 22:41:49.484816074 CEST192.168.2.58.8.8.80x6b4aStandard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                        May 12, 2021 22:41:55.326957941 CEST192.168.2.58.8.8.80x6736Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)

                                                        DNS Answers

                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                        May 12, 2021 22:40:20.157730103 CEST8.8.8.8192.168.2.50xe9bcNo error (0)sys2021.linkpc.net79.137.109.121A (IP address)IN (0x0001)
                                                        May 12, 2021 22:40:26.390404940 CEST8.8.8.8192.168.2.50x79c1No error (0)sys2021.linkpc.net79.137.109.121A (IP address)IN (0x0001)
                                                        May 12, 2021 22:40:32.367516041 CEST8.8.8.8192.168.2.50x641cNo error (0)sys2021.linkpc.net79.137.109.121A (IP address)IN (0x0001)
                                                        May 12, 2021 22:40:56.247328043 CEST8.8.8.8192.168.2.50x6c41No error (0)sys2021.linkpc.net79.137.109.121A (IP address)IN (0x0001)
                                                        May 12, 2021 22:41:02.310091972 CEST8.8.8.8192.168.2.50x3616No error (0)sys2021.linkpc.net79.137.109.121A (IP address)IN (0x0001)
                                                        May 12, 2021 22:41:08.252734900 CEST8.8.8.8192.168.2.50x91cNo error (0)sys2021.linkpc.net79.137.109.121A (IP address)IN (0x0001)
                                                        May 12, 2021 22:41:32.342036963 CEST8.8.8.8192.168.2.50x4eddNo error (0)sys2021.linkpc.net79.137.109.121A (IP address)IN (0x0001)
                                                        May 12, 2021 22:41:49.542527914 CEST8.8.8.8192.168.2.50x6b4aNo error (0)sys2021.linkpc.net79.137.109.121A (IP address)IN (0x0001)
                                                        May 12, 2021 22:41:55.386250973 CEST8.8.8.8192.168.2.50x6736No error (0)sys2021.linkpc.net79.137.109.121A (IP address)IN (0x0001)

                                                        Code Manipulations

                                                        Statistics

                                                        Behavior

                                                        Click to jump to process

                                                        System Behavior

                                                        General

                                                        Start time:22:40:06
                                                        Start date:12/05/2021
                                                        Path:C:\Users\user\Desktop\03_extracted.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'C:\Users\user\Desktop\03_extracted.exe'
                                                        Imagebase:0xfb0000
                                                        File size:784896 bytes
                                                        MD5 hash:43C4F163196FF02E7AA8C5040375FDA4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET
                                                        Yara matches:
                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.252199912.00000000048E1000.00000004.00000001.sdmp, Author: Florian Roth
                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.252199912.00000000048E1000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.252199912.00000000048E1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                        Reputation:low

                                                        General

                                                        Start time:22:40:16
                                                        Start date:12/05/2021
                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LiydYED' /XML 'C:\Users\user\AppData\Local\Temp\tmpE7C8.tmp'
                                                        Imagebase:0xbc0000
                                                        File size:185856 bytes
                                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        General

                                                        Start time:22:40:16
                                                        Start date:12/05/2021
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff7ecfc0000
                                                        File size:625664 bytes
                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        General

                                                        Start time:22:40:17
                                                        Start date:12/05/2021
                                                        Path:C:\Users\user\Desktop\03_extracted.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:{path}
                                                        Imagebase:0x680000
                                                        File size:784896 bytes
                                                        MD5 hash:43C4F163196FF02E7AA8C5040375FDA4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET
                                                        Yara matches:
                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.489322816.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.489322816.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                        • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.489322816.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.496381211.0000000003DE7000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.496381211.0000000003DE7000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.497217215.0000000005290000.00000004.00000001.sdmp, Author: Florian Roth
                                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.497217215.0000000005290000.00000004.00000001.sdmp, Author: Florian Roth
                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.497557539.0000000005650000.00000004.00000001.sdmp, Author: Florian Roth
                                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.497557539.0000000005650000.00000004.00000001.sdmp, Author: Florian Roth
                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.497557539.0000000005650000.00000004.00000001.sdmp, Author: Joe Security
                                                        Reputation:low

                                                        Disassembly

                                                        Code Analysis

                                                        Reset < >