Loading ...

Play interactive tourEdit tour

Analysis Report 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe

Overview

General Information

Sample Name:4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe
Analysis ID:433010
MD5:4df9b2c6531cde226bf1b0ae86d41162
SHA1:9a42c49714905ea1e5f042a683fd80ecff10fc87
SHA256:4714d68dbb9f9ac36425f2ec73ed434cf57407f36063c391e0bfbb9d0b96bbf9
Tags:exenjratRAT
Infos:

Most interesting Screenshot:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Njrat
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Changes the view of files in windows explorer (hidden files and folders)
Contains functionality to log keystrokes (.Net Source)
Drops PE files to the startup folder
Drops PE files with benign system names
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses dynamic DNS services
AV process strings found (often used to terminate AV products)
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe (PID: 6964 cmdline: 'C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe' MD5: 4DF9B2C6531CDE226BF1B0AE86D41162)
    • explorer.exe (PID: 5908 cmdline: 'C:\Windows\System32\explorer.exe' /c select, C:\Users\user\Music\fullview.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
  • svchost.exe (PID: 7084 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • explorer.exe (PID: 6168 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: AD5296B280E8F522A8A897C96BAB0E1D)
    • fullview.exe (PID: 5616 cmdline: 'C:\Users\user\Music\fullview.exe' MD5: 4DF9B2C6531CDE226BF1B0AE86D41162)
      • fullview.exe (PID: 7080 cmdline: C:\Users\user\Music\fullview.exe MD5: 4DF9B2C6531CDE226BF1B0AE86D41162)
  • svchost.exe (PID: 6476 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6524 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6868 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • fullview.exe (PID: 7088 cmdline: 'C:\Users\user\Music\fullview.exe' -boot MD5: 4DF9B2C6531CDE226BF1B0AE86D41162)
    • fullview.exe (PID: 6400 cmdline: C:\Users\user\Music\fullview.exe MD5: 4DF9B2C6531CDE226BF1B0AE86D41162)
  • fullview.exe (PID: 5544 cmdline: 'C:\Users\user\Music\fullview.exe' -boot MD5: 4DF9B2C6531CDE226BF1B0AE86D41162)
    • fullview.exe (PID: 1668 cmdline: C:\Users\user\Music\fullview.exe MD5: 4DF9B2C6531CDE226BF1B0AE86D41162)
  • svchost.exe (PID: 4576 cmdline: 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe' MD5: 4DF9B2C6531CDE226BF1B0AE86D41162)
  • cleanup

Malware Configuration

Threatname: Njrat

{"Install Dir": "svchost.exe", "Install Name": "strangerstrek.duckdns.org", "Host": "True", "Port": "2090", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Campaign ID": "Comienzo", "Version": "0.7.3"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmpJoeSecurity_NjratYara detected NjratJoe Security
    0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
    • 0x11801:$a2: SEE_MASK_NOZONECHECKS
    • 0x11a40:$b1: [TAP]
    • 0x119b8:$c3: cmd.exe /c ping
    0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
    • 0x11801:$reg: SEE_MASK_NOZONECHECKS
    • 0x115ff:$msg: Execute ERROR
    • 0x1165b:$msg: Execute ERROR
    • 0x119b8:$ping: cmd.exe /c ping 0 -n 2 & del
    0000000B.00000002.900690082.0000000000402000.00000040.00000001.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      0000000B.00000002.900690082.0000000000402000.00000040.00000001.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0x11801:$a2: SEE_MASK_NOZONECHECKS
      • 0x11a40:$b1: [TAP]
      • 0x119b8:$c3: cmd.exe /c ping
      Click to see the 57 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      12.2.fullview.exe.46a7ead.7.raw.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
      • 0x11bb8:$x1: cmd.exe /c ping 0 -n 2 & del "
      • 0x11841:$s3: Executed As
      • 0xdecd:$s5: Stub.exe
      • 0x11823:$s6: Download ERROR
      • 0x11705:$s7: shutdown -r -t 00
      12.2.fullview.exe.46a7ead.7.raw.unpackJoeSecurity_NjratYara detected NjratJoe Security
        12.2.fullview.exe.46a7ead.7.raw.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
        • 0x11a01:$a2: SEE_MASK_NOZONECHECKS
        • 0x11c40:$b1: [TAP]
        • 0x11bb8:$c3: cmd.exe /c ping
        12.2.fullview.exe.46a7ead.7.raw.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
        • 0x11a01:$reg: SEE_MASK_NOZONECHECKS
        • 0x117ff:$msg: Execute ERROR
        • 0x1185b:$msg: Execute ERROR
        • 0x11bb8:$ping: cmd.exe /c ping 0 -n 2 & del
        0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.raw.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
        • 0x11bb8:$x1: cmd.exe /c ping 0 -n 2 & del "
        • 0x11841:$s3: Executed As
        • 0xdecd:$s5: Stub.exe
        • 0x11823:$s6: Download ERROR
        • 0x11705:$s7: shutdown -r -t 00
        Click to see the 129 entries

        Sigma Overview

        No Sigma rule has matched

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Antivirus / Scanner detection for submitted sampleShow sources
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeAvira: detected
        Antivirus detection for dropped fileShow sources
        Source: C:\Users\user\Music\fullview.exeAvira: detection malicious, Label: HEUR/AGEN.1122310
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeAvira: detection malicious, Label: HEUR/AGEN.1122310
        Found malware configurationShow sources
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.raw.unpackMalware Configuration Extractor: Njrat {"Install Dir": "svchost.exe", "Install Name": "strangerstrek.duckdns.org", "Host": "True", "Port": "2090", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Campaign ID": "Comienzo", "Version": "0.7.3"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeReversingLabs: Detection: 79%
        Source: C:\Users\user\Music\fullview.exeReversingLabs: Detection: 79%
        Multi AV Scanner detection for submitted fileShow sources
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeVirustotal: Detection: 67%Perma Link
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeReversingLabs: Detection: 79%
        Yara detected NjratShow sources
        Source: Yara matchFile source: 0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.900690082.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.817394894.00000000046A7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.756321021.000000000320B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.681356331.0000000003C47000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.756794475.0000000003FB7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.813989539.00000000034C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.821203720.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.796452577.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.829265628.0000000003691000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.755773699.0000000002DD1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.837153151.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.830327224.0000000003DE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.831852482.0000000004877000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.829183550.0000000002E26000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.828936006.0000000002C18000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.680120099.0000000002A61000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe PID: 6964, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 7088, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 1668, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 5616, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 7080, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 5544, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 6400, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4576, type: MEMORY
        Source: Yara matchFile source: 12.2.fullview.exe.46a7ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.46a7ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.351dc45.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36e488d.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e2916d.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c4edb9.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.3de7ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c62b08.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4877ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.3fb7ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e3cebc.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.3de7ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.3fb7ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36e488d.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.fullview.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c62b08.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.fullview.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.fullview.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.3531994.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4877ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e3cebc.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.0.fullview.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.fullview.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c4edb9.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.fullview.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36f85dc.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.3531994.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36f85dc.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.351dc45.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e2916d.2.raw.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\Music\fullview.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeJoe Sandbox ML: detected
        Source: 16.2.fullview.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
        Source: 18.2.fullview.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
        Source: 16.0.fullview.exe.400000.1.unpackAvira: Label: TR/Dropper.Gen
        Source: 18.0.fullview.exe.400000.1.unpackAvira: Label: TR/Dropper.Gen
        Source: 11.0.fullview.exe.400000.1.unpackAvira: Label: TR/Dropper.Gen
        Source: 11.2.fullview.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: mscorrc.pdb source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.684656632.00000000067A0000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.759339723.0000000006710000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818685449.0000000006D70000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.833000474.00000000065D0000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.833594288.0000000007010000.00000002.00000001.sdmp
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeFile opened: C:\Users\user\AppData\
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeFile opened: C:\Users\user\
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.4:49768 -> 192.169.69.25:2090
        Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.4:49769 -> 192.169.69.25:2090
        Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.4:49770 -> 192.169.69.25:2090
        Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.4:49771 -> 192.169.69.25:2090
        Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.4:49772 -> 192.169.69.25:2090
        Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.4:49773 -> 192.169.69.25:2090
        Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.4:49774 -> 192.169.69.25:2090
        Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.4:49777 -> 192.169.69.25:2090
        Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.4:49778 -> 192.169.69.25:2090
        Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.4:49779 -> 192.169.69.25:2090
        Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.4:49780 -> 192.169.69.25:2090
        Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.4:49781 -> 192.169.69.25:2090
        Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.4:49782 -> 192.169.69.25:2090
        Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.4:49783 -> 192.169.69.25:2090
        Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.4:49784 -> 192.169.69.25:2090
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: True
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: strangerstrek.duckdns.org
        Source: Joe Sandbox ViewIP Address: 192.169.69.25 192.169.69.25
        Source: Joe Sandbox ViewIP Address: 192.169.69.25 192.169.69.25
        Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
        Source: svchost.exe, 00000009.00000002.751847611.00000231CFB00000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotif equals www.facebook.com (Facebook)
        Source: svchost.exe, 00000009.00000002.751847611.00000231CFB00000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotif equals www.twitter.com (Twitter)
        Source: svchost.exe, 00000009.00000003.740002825.00000231CFB50000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-06-10T07:22:21.3909598Z||.||3f037643-6aef-47de-81ac-01c99fe373ef||1152921505693535664||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku"
        Source: svchost.exe, 00000009.00000003.740002825.00000231CFB50000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-06-10T07:22:21.3909598Z||.||3f037643-6aef-47de-81ac-01c99fe373ef||1152921505693535664||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku"
        Source: svchost.exe, 00000009.00000003.728657876.00000231CFB8C000.00000004.00000001.sdmpString found in binary or memory: is absolutely free to play, you have the ability to unlock optional bonuses via in-app purchases from within the game. You may disable in-app purchases in your device settings.\r\n______________________________\r\n\r\nVisit us: www.g5e.com\r\nWatch us: www.youtube.com/g5enter\r\nFind us: www.facebook.com/HiddenCityGame\r\nFollow us: www.twitter.com/g5games\r\nJoin us: www.instagram.com/hiddencity_\r\nGame FAQs: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure\r\nTerms of Service: http://www.g5e.com/termsofservice\r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName":"828B5831.HiddenCityMysteryofShadows","PublisherCertificateName":"CN=A4F05332-BE3A-4155-B996-B100171CD4B1","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"Legac
        Source: svchost.exe, 00000009.00000003.728657876.00000231CFB8C000.00000004.00000001.sdmpString found in binary or memory: is absolutely free to play, you have the ability to unlock optional bonuses via in-app purchases from within the game. You may disable in-app purchases in your device settings.\r\n______________________________\r\n\r\nVisit us: www.g5e.com\r\nWatch us: www.youtube.com/g5enter\r\nFind us: www.facebook.com/HiddenCityGame\r\nFollow us: www.twitter.com/g5games\r\nJoin us: www.instagram.com/hiddencity_\r\nGame FAQs: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure\r\nTerms of Service: http://www.g5e.com/termsofservice\r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName":"828B5831.HiddenCityMysteryofShadows","PublisherCertificateName":"CN=A4F05332-BE3A-4155-B996-B100171CD4B1","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"Legac
        Source: svchost.exe, 00000009.00000003.728657876.00000231CFB8C000.00000004.00000001.sdmpString found in binary or memory: is absolutely free to play, you have the ability to unlock optional bonuses via in-app purchases from within the game. You may disable in-app purchases in your device settings.\r\n______________________________\r\n\r\nVisit us: www.g5e.com\r\nWatch us: www.youtube.com/g5enter\r\nFind us: www.facebook.com/HiddenCityGame\r\nFollow us: www.twitter.com/g5games\r\nJoin us: www.instagram.com/hiddencity_\r\nGame FAQs: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure\r\nTerms of Service: http://www.g5e.com/termsofservice\r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName":"828B5831.HiddenCityMysteryofShadows","PublisherCertificateName":"CN=A4F05332-BE3A-4155-B996-B100171CD4B1","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"Legac
        Source: svchost.exe, 00000009.00000003.731341981.00000231CFB81000.00000004.00000001.sdmpString found in binary or memory: t enough.\r\n\r\nSHARE WITH FRIENDS\r\nSend photos and videos to keep your close friends up to speed. Receive files for even more productivity.\r\n\r\n\r\n*Calls are free over Wi-Fi but otherwise standard data charges apply.\r\nPrivacy Policy: https://www.facebook.com/about/privacy | LEARN MORE at: https://messenger.com (https://messenger.com/)","ProductTitle":"Messenger","SearchTitles":[],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9WZDNCRF0083","Properties":{"PackageFamilyName":"Facebook.317180B0BB486_8xx8rvfyw5nnt","PackageIdentityName":"FACEBOOK.317180B0BB486","PublisherCertificateName":"CN=6E08453F-9BA7-4311-999C-D22FBA2FB1B8","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"c6a9fa5c-20a2-4e12-904d-edd408657dc8"},{"IdType":"LegacyWindowsPhoneProductId","Value":"3219d30d-4a23-4f58-a91c-c44b04e6a0c7"},{"IdType":"XboxTitleId","Value":"2004208728"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-06-09T08:40:24.6537940Z||.||70a39ee4-92a6-4b9a-9580-ae2703a9cc56||1152921505693564220||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku":{"LastModifiedDate":"2021-06-09T08:39:31.1120019Z","LocalizedProperties":[{"SkuDescription":"Made for big screens and close connections. Get access to free* texting, and high-quality voice & video chat built specifically for desktop.\r\n\r\nMADE FOR DESKTOP, MADE
        Source: svchost.exe, 00000009.00000003.733581218.00000231CFB8A000.00000004.00000001.sdmpString found in binary or memory: t enough.\r\n\r\nSHARE WITH FRIENDS\r\nSend photos and videos to keep your close friends up to speed. Receive files for even more productivity.\r\n\r\n\r\n*Calls are free over Wi-Fi but otherwise standard data charges apply.\r\nPrivacy Policy: https://www.facebook.com/about/privacy | LEARN MORE at: https://messenger.com (https://messenger.com/)","ProductTitle":"Messenger","SearchTitles":[],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","Rx% equals www.facebook.com (Facebook)
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.681356331.0000000003C47000.00000004.00000001.sdmp, fullview.exe, 00000004.00000002.756321021.000000000320B000.00000004.00000001.sdmp, fullview.exe, 0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmp, fullview.exe, 0000000C.00000002.813989539.00000000034C1000.00000004.00000001.sdmp, fullview.exe, 0000000D.00000002.830327224.0000000003DE7000.00000004.00000001.sdmp, fullview.exe, 00000010.00000002.821203720.0000000000402000.00000040.00000001.sdmp, svchost.exe, 00000011.00000002.829265628.0000000003691000.00000004.00000001.sdmp, fullview.exe, 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmpString found in binary or memory: Watch this video to learn how to pay us https://www.youtube.com/watch?v=Ji9IwPId5UkQThis is not a joke. This is a ransomware}Ransomware: Couldn't send address. The stub has no BTC address equals www.youtube.com (Youtube)
        Source: svchost.exe, 00000009.00000003.731322628.00000231CFB50000.00000004.00000001.sdmpString found in binary or memory: t enough.\r\n\r\nSHARE WITH FRIENDS\r\nSend photos and videos to keep your close friends up to speed. Receive files for even more productivity.\r\n\r\n\r\n*Calls are free over Wi-Fi but otherwise standard data charges apply.\r\nPrivacy Policy: https://www.facebook.com/about/privacy | LEARN MORE at: https://messenger.com (https://messenger.com/)","ProductTitle":"Messenger","SearchTitles":[],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9WZDNCRF0083","Properties":{"PackageFamilyName":"Facebook.317180B0BB486_8xx8rvfyw5nnt","PackageIdentityName":"FACEBOOK.317180B0BB486","PublisherCertificateName":"CN=6E08453F-9BA7-4311-999C-D22FBA2FB1B8","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"c6a9fa5c-20a2-4e12-904d-edd408657dc8"},{"IdType":"LegacyWindowsPhoneProductId","Value":"3219d30d-4a23-4f58-a91c-c44b04e6a0c7"},{"IdType":"XboxTitleId","Value":"2004208728"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-06-09T08:40:24.6537940Z||.||70a39ee4-92a6-4b9a-9580-ae2703a9cc56||1152921505693564220||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku":{"LastModifiedDate":"2021-06-09T08:39:31.1120019Z","LocalizedProperties":[{"SkuDescription":"Made for big screens and close connections. Get access to free* texting, and high-quality voice & video chat built specifically for desktop.\r\n\r\nMADE FOR DESKTOP, MADE
        Source: unknownDNS traffic detected: queries for: strangerstrek.duckdns.org
        Source: svchost.exe, 00000009.00000002.751615644.00000231CF2BD000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
        Source: svchost.exe, 00000009.00000002.751615644.00000231CF2BD000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
        Source: svchost.exe, 00000009.00000002.751615644.00000231CF2BD000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: fullview.exe, 0000000C.00000003.746795395.0000000005A4D000.00000004.00000001.sdmp, fullview.exe, 0000000C.00000003.746606206.0000000005A4D000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado
        Source: fullview.exe, 00000004.00000003.753222861.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://ns.adob
        Source: fullview.exe, 00000004.00000003.688463111.000000000542D000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c
        Source: fullview.exe, 00000004.00000003.753222861.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.co
        Source: fullview.exe, 0000000C.00000003.811336680.0000000005A4D000.00000004.00000001.sdmpString found in binary or memory: http://ns.adom
        Source: fullview.exe, 00000004.00000003.753222861.0000000005433000.00000004.00000001.sdmp, fullview.exe, 00000004.00000003.688463111.000000000542D000.00000004.00000001.sdmpString found in binary or memory: http://ns.micro
        Source: svchost.exe, 00000009.00000002.751615644.00000231CF2BD000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637470883.0000000005088000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637470883.0000000005088000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com=
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637436308.0000000005088000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comCInN
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637571579.0000000005088000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637571579.0000000005088000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comcro
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637522421.0000000005088000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comh-c
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637389364.0000000005089000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comyrl
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.639668812.0000000005087000.00000004.00000001.sdmp, 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.638929660.0000000005087000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers5
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.639326811.0000000005086000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersN
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.635522881.000000000509B000.00000004.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.635541486.000000000509B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comQ
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.635626829.000000000509B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comicj
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636982622.00000000050BD000.00000004.00000001.sdmp, 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636890228.0000000005084000.00000004.00000001.sdmp, 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636768655.0000000005083000.00000004.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636923218.00000000050BD000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn7
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636890228.0000000005084000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cns
        Source: svchost.exe, 00000009.00000003.728657876.00000231CFB8C000.00000004.00000001.sdmpString found in binary or memory: http://www.g5e.com/G5_End_User_License_Supplemental_Terms
        Source: svchost.exe, 00000009.00000003.728657876.00000231CFB8C000.00000004.00000001.sdmpString found in binary or memory: http://www.g5e.com/termsofservice
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.641286865.0000000005085000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.641328281.0000000005086000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm0
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.641286865.0000000005085000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmX
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636489484.0000000005082000.00000004.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636489484.0000000005082000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.krO
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: svchost.exe, 00000009.00000002.751687464.00000231CF2EE000.00000004.00000001.sdmpString found in binary or memory: http://www.microsoft.
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636768655.0000000005083000.00000004.00000001.sdmp, 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636489484.0000000005082000.00000004.00000001.sdmp, 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637170702.0000000005082000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.
        Source: svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637627152.0000000005088000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com&
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637155791.0000000005083000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comadnl
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637627152.0000000005088000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comlic
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.640449829.0000000005086000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: svchost.exe, 00000009.00000003.736811427.00000231CFB9F000.00000004.00000001.sdmp, svchost.exe, 00000009.00000003.736758526.00000231CFB94000.00000004.00000001.sdmpString found in binary or memory: https://corp.roblox.com/contact/
        Source: svchost.exe, 00000009.00000003.736811427.00000231CFB9F000.00000004.00000001.sdmp, svchost.exe, 00000009.00000003.736758526.00000231CFB94000.00000004.00000001.sdmp, svchost.exe, 00000009.00000003.736861958.00000231CFB41000.00000004.00000001.sdmp, svchost.exe, 00000009.00000003.736891454.00000231CFB50000.00000004.00000001.sdmpString found in binary or memory: https://corp.roblox.com/parents/
        Source: svchost.exe, 00000009.00000003.736811427.00000231CFB9F000.00000004.00000001.sdmp, svchost.exe, 00000009.00000003.736758526.00000231CFB94000.00000004.00000001.sdmpString found in binary or memory: https://en.help.roblox.com/hc/en-us
        Source: svchost.exe, 00000009.00000003.728657876.00000231CFB8C000.00000004.00000001.sdmpString found in binary or memory: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure
        Source: svchost.exe, 00000009.00000003.736811427.00000231CFB9F000.00000004.00000001.sdmp, svchost.exe, 00000009.00000003.736758526.00000231CFB94000.00000004.00000001.sdmpString found in binary or memory: https://www.roblox.com/develop
        Source: svchost.exe, 00000009.00000003.736811427.00000231CFB9F000.00000004.00000001.sdmp, svchost.exe, 00000009.00000003.736758526.00000231CFB94000.00000004.00000001.sdmpString found in binary or memory: https://www.roblox.com/info/privacy
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.681356331.0000000003C47000.00000004.00000001.sdmp, fullview.exe, 00000004.00000002.756321021.000000000320B000.00000004.00000001.sdmp, fullview.exe, 0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmp, fullview.exe, 0000000C.00000002.813989539.00000000034C1000.00000004.00000001.sdmp, fullview.exe, 0000000D.00000002.830327224.0000000003DE7000.00000004.00000001.sdmp, fullview.exe, 00000010.00000002.821203720.0000000000402000.00000040.00000001.sdmp, svchost.exe, 00000011.00000002.829265628.0000000003691000.00000004.00000001.sdmp, fullview.exe, 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.youtube.com/watch?v=Ji9IwPId5UkQThis

        Key, Mouse, Clipboard, Microphone and Screen Capturing:

        barindex
        Contains functionality to log keystrokes (.Net Source)Show sources
        Source: 11.0.fullview.exe.400000.1.unpack, Lime/kl.cs.Net Code: VKCodeToUnicode
        Source: 11.0.fullview.exe.400000.1.unpack, LimeSL.cs.Net Code: SetHook
        Source: 11.2.fullview.exe.400000.0.unpack, Lime/kl.cs.Net Code: VKCodeToUnicode
        Source: 11.2.fullview.exe.400000.0.unpack, LimeSL.cs.Net Code: SetHook
        Source: 16.2.fullview.exe.400000.0.unpack, LimeSL.cs.Net Code: SetHook
        Source: 16.2.fullview.exe.400000.0.unpack, Lime/kl.cs.Net Code: VKCodeToUnicode
        Source: svchost.exe, 00000011.00000002.828234765.0000000001200000.00000004.00000001.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

        E-Banking Fraud:

        barindex
        Yara detected NjratShow sources
        Source: Yara matchFile source: 0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.900690082.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.817394894.00000000046A7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.756321021.000000000320B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.681356331.0000000003C47000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.756794475.0000000003FB7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.813989539.00000000034C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.821203720.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.796452577.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.829265628.0000000003691000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.755773699.0000000002DD1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.837153151.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.830327224.0000000003DE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.831852482.0000000004877000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.829183550.0000000002E26000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.828936006.0000000002C18000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.680120099.0000000002A61000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe PID: 6964, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 7088, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 1668, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 5616, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 7080, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 5544, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 6400, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4576, type: MEMORY
        Source: Yara matchFile source: 12.2.fullview.exe.46a7ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.46a7ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.351dc45.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36e488d.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e2916d.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c4edb9.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.3de7ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c62b08.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4877ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.3fb7ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e3cebc.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.3de7ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.3fb7ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36e488d.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.fullview.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c62b08.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.fullview.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.fullview.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.3531994.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4877ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e3cebc.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.0.fullview.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.fullview.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c4edb9.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.fullview.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36f85dc.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.3531994.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36f85dc.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.351dc45.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e2916d.2.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0000000B.00000002.900690082.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0000000B.00000002.900690082.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0000000C.00000002.817394894.00000000046A7000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0000000C.00000002.817394894.00000000046A7000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000004.00000002.756321021.000000000320B000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000004.00000002.756321021.000000000320B000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000000.00000002.681356331.0000000003C47000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000000.00000002.681356331.0000000003C47000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000004.00000002.756794475.0000000003FB7000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000004.00000002.756794475.0000000003FB7000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0000000C.00000002.813989539.00000000034C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0000000C.00000002.813989539.00000000034C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000010.00000002.821203720.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000010.00000002.821203720.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000010.00000000.796452577.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000010.00000000.796452577.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000011.00000002.829265628.0000000003691000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000011.00000002.829265628.0000000003691000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000004.00000002.755773699.0000000002DD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000004.00000002.755773699.0000000002DD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000012.00000002.837153151.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000012.00000002.837153151.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0000000D.00000002.830327224.0000000003DE7000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0000000D.00000002.830327224.0000000003DE7000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000011.00000002.831852482.0000000004877000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000011.00000002.831852482.0000000004877000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0000000D.00000002.829183550.0000000002E26000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0000000D.00000002.829183550.0000000002E26000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0000000D.00000002.828936006.0000000002C18000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0000000D.00000002.828936006.0000000002C18000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000000.00000002.680120099.0000000002A61000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000000.00000002.680120099.0000000002A61000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 12.2.fullview.exe.46a7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 12.2.fullview.exe.46a7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 12.2.fullview.exe.46a7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 12.2.fullview.exe.46a7ead.7.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 12.2.fullview.exe.46a7ead.7.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 12.2.fullview.exe.46a7ead.7.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 12.2.fullview.exe.351dc45.2.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 12.2.fullview.exe.351dc45.2.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 12.2.fullview.exe.351dc45.2.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 17.2.svchost.exe.36e488d.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 17.2.svchost.exe.36e488d.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 17.2.svchost.exe.36e488d.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 4.2.fullview.exe.2e2916d.2.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 4.2.fullview.exe.2e2916d.2.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 4.2.fullview.exe.2e2916d.2.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 13.2.fullview.exe.2c4edb9.2.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 13.2.fullview.exe.2c4edb9.2.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 13.2.fullview.exe.2c4edb9.2.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 13.2.fullview.exe.3de7ead.7.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 13.2.fullview.exe.3de7ead.7.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 13.2.fullview.exe.3de7ead.7.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 13.2.fullview.exe.2c62b08.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 13.2.fullview.exe.2c62b08.1.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 17.2.svchost.exe.4877ead.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 17.2.svchost.exe.4877ead.7.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 17.2.svchost.exe.4877ead.7.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 4.2.fullview.exe.3fb7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 4.2.fullview.exe.3fb7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 4.2.fullview.exe.3fb7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 4.2.fullview.exe.2e3cebc.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 4.2.fullview.exe.2e3cebc.1.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 13.2.fullview.exe.3de7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 13.2.fullview.exe.3de7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 13.2.fullview.exe.3de7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 4.2.fullview.exe.3fb7ead.7.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 4.2.fullview.exe.3fb7ead.7.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 4.2.fullview.exe.3fb7ead.7.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 17.2.svchost.exe.36e488d.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 17.2.svchost.exe.36e488d.1.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 16.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 16.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 16.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 13.2.fullview.exe.2c62b08.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 13.2.fullview.exe.2c62b08.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 13.2.fullview.exe.2c62b08.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 18.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 18.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 18.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 16.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 16.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 16.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 12.2.fullview.exe.3531994.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 12.2.fullview.exe.3531994.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 12.2.fullview.exe.3531994.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 17.2.svchost.exe.4877ead.7.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 17.2.svchost.exe.4877ead.7.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 17.2.svchost.exe.4877ead.7.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 4.2.fullview.exe.2e3cebc.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 4.2.fullview.exe.2e3cebc.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 4.2.fullview.exe.2e3cebc.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 18.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 18.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 18.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 11.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 11.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 11.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 13.2.fullview.exe.2c4edb9.2.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 13.2.fullview.exe.2c4edb9.2.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 11.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 11.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 11.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 17.2.svchost.exe.36f85dc.2.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 17.2.svchost.exe.36f85dc.2.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 17.2.svchost.exe.36f85dc.2.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 12.2.fullview.exe.3531994.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 12.2.fullview.exe.3531994.1.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 17.2.svchost.exe.36f85dc.2.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 17.2.svchost.exe.36f85dc.2.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 12.2.fullview.exe.351dc45.2.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 12.2.fullview.exe.351dc45.2.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 4.2.fullview.exe.2e2916d.2.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 4.2.fullview.exe.2e2916d.2.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        .NET source code contains very large array initializationsShow sources
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: fullview.exe.0.dr, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: 0.0.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3d0000.0.unpack, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3d0000.0.unpack, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: 4.2.fullview.exe.740000.0.unpack, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: 4.0.fullview.exe.740000.0.unpack, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: svchost.exe.11.dr, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: 11.0.fullview.exe.dc0000.2.unpack, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: 11.0.fullview.exe.dc0000.0.unpack, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: 11.2.fullview.exe.dc0000.1.unpack, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: 12.0.fullview.exe.d30000.0.unpack, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: 12.2.fullview.exe.d30000.0.unpack, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: 13.0.fullview.exe.580000.0.unpack, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: 13.2.fullview.exe.580000.0.unpack, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: 16.0.fullview.exe.d40000.0.unpack, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: 16.0.fullview.exe.d40000.2.unpack, busnnett/U1.csLarge array initialization: GetByte: array initializer size 74240
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeFile created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.newJump to behavior
        Source: C:\Users\user\Music\fullview.exeFile deleted: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.5616.4731968Jump to behavior
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeCode function: 0_2_04C12548
        Source: C:\Users\user\Music\fullview.exeCode function: 4_2_05122548
        Source: C:\Users\user\Music\fullview.exeCode function: 12_2_05832548
        Source: C:\Users\user\Music\fullview.exeCode function: 13_2_05072548
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.685770002.0000000006DF0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameeconomymode.exe8 vs 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.685742568.0000000006DD0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.686354866.0000000007350000.00000002.00000001.sdmpBinary or memory string: originalfilename vs 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.686354866.0000000007350000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.685866192.0000000007250000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000000.634243918.000000000045E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamezsinnadaverde.exe vs 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.684656632.00000000067A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeBinary or memory string: OriginalFilenamezsinnadaverde.exe vs 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0000000B.00000002.900690082.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0000000B.00000002.900690082.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0000000C.00000002.817394894.00000000046A7000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0000000C.00000002.817394894.00000000046A7000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000004.00000002.756321021.000000000320B000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000004.00000002.756321021.000000000320B000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000000.00000002.681356331.0000000003C47000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000000.00000002.681356331.0000000003C47000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000004.00000002.756794475.0000000003FB7000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000004.00000002.756794475.0000000003FB7000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0000000C.00000002.813989539.00000000034C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0000000C.00000002.813989539.00000000034C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000010.00000002.821203720.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000010.00000002.821203720.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000010.00000000.796452577.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000010.00000000.796452577.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000011.00000002.829265628.0000000003691000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000011.00000002.829265628.0000000003691000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000004.00000002.755773699.0000000002DD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000004.00000002.755773699.0000000002DD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000012.00000002.837153151.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000012.00000002.837153151.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0000000D.00000002.830327224.0000000003DE7000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0000000D.00000002.830327224.0000000003DE7000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000011.00000002.831852482.0000000004877000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000011.00000002.831852482.0000000004877000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0000000D.00000002.829183550.0000000002E26000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0000000D.00000002.829183550.0000000002E26000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0000000D.00000002.828936006.0000000002C18000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0000000D.00000002.828936006.0000000002C18000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000000.00000002.680120099.0000000002A61000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000000.00000002.680120099.0000000002A61000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 12.2.fullview.exe.46a7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.fullview.exe.46a7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 12.2.fullview.exe.46a7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 12.2.fullview.exe.46a7ead.7.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.fullview.exe.46a7ead.7.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 12.2.fullview.exe.46a7ead.7.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 12.2.fullview.exe.351dc45.2.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.fullview.exe.351dc45.2.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 12.2.fullview.exe.351dc45.2.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 17.2.svchost.exe.36e488d.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.svchost.exe.36e488d.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 17.2.svchost.exe.36e488d.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 4.2.fullview.exe.2e2916d.2.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.fullview.exe.2e2916d.2.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 4.2.fullview.exe.2e2916d.2.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 13.2.fullview.exe.2c4edb9.2.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 13.2.fullview.exe.2c4edb9.2.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 13.2.fullview.exe.2c4edb9.2.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 13.2.fullview.exe.3de7ead.7.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 13.2.fullview.exe.3de7ead.7.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 13.2.fullview.exe.3de7ead.7.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 13.2.fullview.exe.2c62b08.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 13.2.fullview.exe.2c62b08.1.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 17.2.svchost.exe.4877ead.7.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.svchost.exe.4877ead.7.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 17.2.svchost.exe.4877ead.7.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 4.2.fullview.exe.3fb7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.fullview.exe.3fb7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 4.2.fullview.exe.3fb7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 4.2.fullview.exe.2e3cebc.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 4.2.fullview.exe.2e3cebc.1.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 13.2.fullview.exe.3de7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 13.2.fullview.exe.3de7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 13.2.fullview.exe.3de7ead.7.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 4.2.fullview.exe.3fb7ead.7.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.fullview.exe.3fb7ead.7.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 4.2.fullview.exe.3fb7ead.7.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 17.2.svchost.exe.36e488d.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 17.2.svchost.exe.36e488d.1.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 16.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 16.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 16.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 13.2.fullview.exe.2c62b08.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 13.2.fullview.exe.2c62b08.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 13.2.fullview.exe.2c62b08.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 18.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 18.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 18.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 16.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 16.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 16.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 12.2.fullview.exe.3531994.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.fullview.exe.3531994.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 12.2.fullview.exe.3531994.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 17.2.svchost.exe.4877ead.7.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.svchost.exe.4877ead.7.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 17.2.svchost.exe.4877ead.7.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 4.2.fullview.exe.2e3cebc.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.fullview.exe.2e3cebc.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 4.2.fullview.exe.2e3cebc.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 18.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 18.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 18.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 11.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 11.0.fullview.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 13.2.fullview.exe.2c4edb9.2.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 13.2.fullview.exe.2c4edb9.2.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 11.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 11.2.fullview.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 17.2.svchost.exe.36f85dc.2.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.svchost.exe.36f85dc.2.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 17.2.svchost.exe.36f85dc.2.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 12.2.fullview.exe.3531994.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 12.2.fullview.exe.3531994.1.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 17.2.svchost.exe.36f85dc.2.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 17.2.svchost.exe.36f85dc.2.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 12.2.fullview.exe.351dc45.2.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 12.2.fullview.exe.351dc45.2.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 4.2.fullview.exe.2e2916d.2.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 4.2.fullview.exe.2e2916d.2.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: fullview.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: svchost.exe.11.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 11.0.fullview.exe.400000.1.unpack, Rware.csCryptographic APIs: 'TransformFinalBlock'
        Source: 11.0.fullview.exe.400000.1.unpack, RwareDE.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
        Source: 11.2.fullview.exe.400000.0.unpack, Rware.csCryptographic APIs: 'TransformFinalBlock'
        Source: 11.2.fullview.exe.400000.0.unpack, RwareDE.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
        Source: 16.2.fullview.exe.400000.0.unpack, RwareDE.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
        Source: 16.2.fullview.exe.400000.0.unpack, Rware.csCryptographic APIs: 'TransformFinalBlock'
        Source: 11.0.fullview.exe.400000.1.unpack, BotKillers.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 11.0.fullview.exe.400000.1.unpack, BotKillers.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 11.0.fullview.exe.400000.1.unpack, BotKillers.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
        Source: 16.2.fullview.exe.400000.0.unpack, BotKillers.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 16.2.fullview.exe.400000.0.unpack, BotKillers.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 16.2.fullview.exe.400000.0.unpack, BotKillers.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
        Source: 11.2.fullview.exe.400000.0.unpack, BotKillers.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 11.2.fullview.exe.400000.0.unpack, BotKillers.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 11.2.fullview.exe.400000.0.unpack, BotKillers.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
        Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@19/16@16/1
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeCode function: 0_2_05210AFE AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeCode function: 0_2_05210AC7 AdjustTokenPrivileges,
        Source: C:\Users\user\Music\fullview.exeCode function: 4_2_06C70AFE AdjustTokenPrivileges,
        Source: C:\Users\user\Music\fullview.exeCode function: 4_2_06C70AEC AdjustTokenPrivileges,
        Source: C:\Users\user\Music\fullview.exeCode function: 11_2_0318259E AdjustTokenPrivileges,
        Source: C:\Users\user\Music\fullview.exeCode function: 11_2_03182567 AdjustTokenPrivileges,
        Source: C:\Users\user\Music\fullview.exeCode function: 12_2_05900AFE AdjustTokenPrivileges,
        Source: C:\Users\user\Music\fullview.exeCode function: 12_2_05900AC7 AdjustTokenPrivileges,
        Source: C:\Users\user\Music\fullview.exeCode function: 13_2_05150AFE AdjustTokenPrivileges,
        Source: C:\Users\user\Music\fullview.exeCode function: 13_2_05150AC7 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeFile created: C:\Users\user\Music\fullview.exeJump to behavior
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess created: C:\Windows\SysWOW64\explorer.exe
        Source: unknownProcess created: C:\Windows\explorer.exe
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess created: C:\Windows\SysWOW64\explorer.exe
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Music\fullview.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Music\fullview.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Music\fullview.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeVirustotal: Detection: 67%
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeReversingLabs: Detection: 79%
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeFile read: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe 'C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe'
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess created: C:\Windows\SysWOW64\explorer.exe 'C:\Windows\System32\explorer.exe' /c select, C:\Users\user\Music\fullview.exe
        Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        Source: C:\Windows\explorer.exeProcess created: C:\Users\user\Music\fullview.exe 'C:\Users\user\Music\fullview.exe'
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
        Source: C:\Users\user\Music\fullview.exeProcess created: C:\Users\user\Music\fullview.exe C:\Users\user\Music\fullview.exe
        Source: unknownProcess created: C:\Users\user\Music\fullview.exe 'C:\Users\user\Music\fullview.exe' -boot
        Source: unknownProcess created: C:\Users\user\Music\fullview.exe 'C:\Users\user\Music\fullview.exe' -boot
        Source: C:\Users\user\Music\fullview.exeProcess created: C:\Users\user\Music\fullview.exe C:\Users\user\Music\fullview.exe
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe'
        Source: C:\Users\user\Music\fullview.exeProcess created: C:\Users\user\Music\fullview.exe C:\Users\user\Music\fullview.exe
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess created: C:\Windows\SysWOW64\explorer.exe 'C:\Windows\System32\explorer.exe' /c select, C:\Users\user\Music\fullview.exe
        Source: C:\Windows\explorer.exeProcess created: C:\Users\user\Music\fullview.exe 'C:\Users\user\Music\fullview.exe'
        Source: C:\Users\user\Music\fullview.exeProcess created: C:\Users\user\Music\fullview.exe C:\Users\user\Music\fullview.exe
        Source: C:\Users\user\Music\fullview.exeProcess created: C:\Users\user\Music\fullview.exe C:\Users\user\Music\fullview.exe
        Source: C:\Users\user\Music\fullview.exeProcess created: C:\Users\user\Music\fullview.exe C:\Users\user\Music\fullview.exe
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: mscorrc.pdb source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.684656632.00000000067A0000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.759339723.0000000006710000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818685449.0000000006D70000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.833000474.00000000065D0000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.833594288.0000000007010000.00000002.00000001.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 11.0.fullview.exe.400000.1.unpack, Lime/Core.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.2.fullview.exe.400000.0.unpack, Lime/Core.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 16.2.fullview.exe.400000.0.unpack, Lime/Core.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeCode function: 0_2_0045B55B push es; iretd
        Source: C:\Users\user\Music\fullview.exeCode function: 4_2_007CB55B push es; iretd
        Source: C:\Users\user\Music\fullview.exeCode function: 4_2_010D841E push ebp; ret
        Source: C:\Users\user\Music\fullview.exeCode function: 4_2_010D7FC9 push ecx; ret
        Source: C:\Users\user\Music\fullview.exeCode function: 11_2_00E4B55B push es; iretd
        Source: C:\Users\user\Music\fullview.exeCode function: 11_2_0573063F push 6D2AC360h; ret
        Source: C:\Users\user\Music\fullview.exeCode function: 11_2_0573051B push 6D2AC310h; ret
        Source: C:\Users\user\Music\fullview.exeCode function: 12_2_00DBB55B push es; iretd
        Source: C:\Users\user\Music\fullview.exeCode function: 12_2_016A83DE push ecx; ret
        Source: C:\Users\user\Music\fullview.exeCode function: 12_2_016A8423 push ebp; ret
        Source: C:\Users\user\Music\fullview.exeCode function: 12_2_016A8502 push 00000001h; retf
        Source: C:\Users\user\Music\fullview.exeCode function: 12_2_016A8497 push 00000001h; ret
        Source: C:\Users\user\Music\fullview.exeCode function: 13_2_0060B55B push es; iretd
        Source: C:\Users\user\Music\fullview.exeCode function: 13_2_00BF841E push ebp; ret
        Source: C:\Users\user\Music\fullview.exeCode function: 13_2_00BF7FC9 push ecx; ret
        Source: C:\Users\user\Music\fullview.exeCode function: 16_2_00DCB55B push es; iretd
        Source: initial sampleStatic PE information: section name: .text entropy: 7.9564698476
        Source: initial sampleStatic PE information: section name: .text entropy: 7.9564698476
        Source: initial sampleStatic PE information: section name: .text entropy: 7.9564698476

        Persistence and Installation Behavior:

        barindex
        Drops PE files with benign system namesShow sources
        Source: C:\Users\user\Music\fullview.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeJump to dropped file
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeFile created: C:\Users\user\Music\fullview.exeJump to dropped file
        Source: C:\Users\user\Music\fullview.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeJump to dropped file

        Boot Survival:

        barindex
        Drops PE files to the startup folderShow sources
        Source: C:\Users\user\Music\fullview.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeJump to dropped file
        Source: C:\Users\user\Music\fullview.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeJump to behavior
        Source: C:\Users\user\Music\fullview.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeJump to behavior
        Source: C:\Users\user\Music\fullview.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run fullviewJump to behavior
        Source: C:\Users\user\Music\fullview.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run fullviewJump to behavior

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Changes the view of files in windows explorer (hidden files and folders)Show sources
        Source: C:\Users\user\Music\fullview.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced HiddenJump to behavior
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeFile opened: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Music\fullview.exeFile opened: C:\Users\user\Music\fullview.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Music\fullview.exeFile opened: C:\Users\user\Music\fullview.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Music\fullview.exeFile opened: C:\Users\user\Music\fullview.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Music\fullview.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\explorer.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Music\fullview.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Music\fullview.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Music\fullview.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Music\fullview.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Music\fullview.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Music\fullview.exeWindow / User API: threadDelayed 3133
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe TID: 7000Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Music\fullview.exe TID: 1288Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\svchost.exe TID: 7020Thread sleep time: -210000s >= -30000s
        Source: C:\Users\user\Music\fullview.exe TID: 6492Thread sleep count: 3133 > 30
        Source: C:\Users\user\Music\fullview.exe TID: 3296Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Music\fullview.exe TID: 1000Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Music\fullview.exe TID: 5892Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe TID: 5112Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Music\fullview.exe TID: 5400Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Music\fullview.exeLast function: Thread delayed
        Source: C:\Users\user\Music\fullview.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Music\fullview.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Music\fullview.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Music\fullview.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Music\fullview.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Music\fullview.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeFile opened: C:\Users\user\AppData\
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeFile opened: C:\Users\user\
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\
        Source: fullview.exe, 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmpBinary or memory string: VBoxServiceoAntiProcess: VirtrualBox was detected! I deleted myself
        Source: explorer.exe, 00000003.00000002.900998536.0000000001187000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:
        Source: svchost.exe, 00000001.00000002.650495613.00000246B8660000.00000002.00000001.sdmp, svchost.exe, 00000006.00000002.706979746.00000296A1F40000.00000002.00000001.sdmp, svchost.exe, 00000007.00000002.718917935.0000023B3CB40000.00000002.00000001.sdmp, svchost.exe, 00000009.00000002.752331008.00000231D0200000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: svchost.exe, 00000009.00000002.751700582.00000231CF2F9000.00000004.00000001.sdmpBinary or memory string: @Hyper-V RAW
        Source: svchost.exe, 00000009.00000002.751687464.00000231CF2EE000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
        Source: svchost.exe, 00000001.00000002.650495613.00000246B8660000.00000002.00000001.sdmp, svchost.exe, 00000006.00000002.706979746.00000296A1F40000.00000002.00000001.sdmp, svchost.exe, 00000007.00000002.718917935.0000023B3CB40000.00000002.00000001.sdmp, svchost.exe, 00000009.00000002.752331008.00000231D0200000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: svchost.exe, 00000001.00000002.650495613.00000246B8660000.00000002.00000001.sdmp, svchost.exe, 00000006.00000002.706979746.00000296A1F40000.00000002.00000001.sdmp, svchost.exe, 00000007.00000002.718917935.0000023B3CB40000.00000002.00000001.sdmp, svchost.exe, 00000009.00000002.752331008.00000231D0200000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: fullview.exe, 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmpBinary or memory string: VGAuthServiceeAntiProcess: VMware was detected! I deleted myself
        Source: fullview.exe, 0000000B.00000002.901269787.0000000001453000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllA
        Source: svchost.exe, 00000001.00000002.650495613.00000246B8660000.00000002.00000001.sdmp, svchost.exe, 00000006.00000002.706979746.00000296A1F40000.00000002.00000001.sdmp, svchost.exe, 00000007.00000002.718917935.0000023B3CB40000.00000002.00000001.sdmp, svchost.exe, 00000009.00000002.752331008.00000231D0200000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess token adjusted: Debug
        Source: C:\Users\user\Music\fullview.exeProcess token adjusted: Debug
        Source: C:\Users\user\Music\fullview.exeProcess token adjusted: Debug
        Source: C:\Users\user\Music\fullview.exeProcess token adjusted: Debug
        Source: C:\Users\user\Music\fullview.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        .NET source code references suspicious native API functionsShow sources
        Source: 11.0.fullview.exe.400000.1.unpack, Lime/Core.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
        Source: 11.0.fullview.exe.400000.1.unpack, Lime/kl.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32'), ('MapVirtualKey', 'MapVirtualKey@user32.dll')
        Source: 11.2.fullview.exe.400000.0.unpack, Lime/Core.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
        Source: 11.2.fullview.exe.400000.0.unpack, Lime/kl.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32'), ('MapVirtualKey', 'MapVirtualKey@user32.dll')
        Source: 16.2.fullview.exe.400000.0.unpack, Lime/Core.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
        Source: 16.2.fullview.exe.400000.0.unpack, Lime/kl.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32'), ('MapVirtualKey', 'MapVirtualKey@user32.dll')
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Music\fullview.exeMemory written: C:\Users\user\Music\fullview.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Music\fullview.exeMemory written: C:\Users\user\Music\fullview.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Music\fullview.exeMemory written: C:\Users\user\Music\fullview.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeProcess created: C:\Windows\SysWOW64\explorer.exe 'C:\Windows\System32\explorer.exe' /c select, C:\Users\user\Music\fullview.exe
        Source: C:\Users\user\Music\fullview.exeProcess created: C:\Users\user\Music\fullview.exe C:\Users\user\Music\fullview.exe
        Source: C:\Users\user\Music\fullview.exeProcess created: C:\Users\user\Music\fullview.exe C:\Users\user\Music\fullview.exe
        Source: C:\Users\user\Music\fullview.exeProcess created: C:\Users\user\Music\fullview.exe C:\Users\user\Music\fullview.exe
        Source: explorer.exe, 00000003.00000002.901239924.00000000017E0000.00000002.00000001.sdmp, fullview.exe, 0000000B.00000002.901557417.0000000001B80000.00000002.00000001.sdmpBinary or memory string: Program Manager
        Source: explorer.exe, 00000003.00000002.901239924.00000000017E0000.00000002.00000001.sdmp, fullview.exe, 0000000B.00000002.901557417.0000000001B80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: explorer.exe, 00000003.00000002.901239924.00000000017E0000.00000002.00000001.sdmp, fullview.exe, 0000000B.00000002.901557417.0000000001B80000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: explorer.exe, 00000003.00000002.901239924.00000000017E0000.00000002.00000001.sdmp, fullview.exe, 0000000B.00000002.901557417.0000000001B80000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: fullview.exe, 0000000B.00000002.902417621.0000000003501000.00000004.00000001.sdmpBinary or memory string: Program Manager|9
        Source: fullview.exe, 0000000B.00000002.902417621.0000000003501000.00000004.00000001.sdmpBinary or memory string: Program Manager<
        Source: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.681356331.0000000003C47000.00000004.00000001.sdmp, fullview.exe, 00000004.00000002.756321021.000000000320B000.00000004.00000001.sdmp, fullview.exe, 0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmp, fullview.exe, 0000000C.00000002.813989539.00000000034C1000.00000004.00000001.sdmp, fullview.exe, 0000000D.00000002.830327224.0000000003DE7000.00000004.00000001.sdmp, fullview.exe, 00000010.00000002.821203720.0000000000402000.00000040.00000001.sdmp, svchost.exe, 00000011.00000002.829265628.0000000003691000.00000004.00000001.sdmp, fullview.exe, 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmpBinary or memory string: Shell_traywnd
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Music\fullview.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Music\fullview.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Music\fullview.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Music\fullview.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Music\fullview.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Music\fullview.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Music\fullview.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Music\fullview.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Music\fullview.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Music\fullview.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Music\fullview.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Music\fullview.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: fullview.exe, 0000000B.00000002.901269787.0000000001453000.00000004.00000020.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: C:\Users\user\Music\fullview.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
        Source: C:\Users\user\Music\fullview.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
        Source: C:\Users\user\Music\fullview.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
        Source: C:\Users\user\Music\fullview.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
        Source: C:\Users\user\Music\fullview.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
        Source: C:\Users\user\Music\fullview.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
        Source: C:\Users\user\Music\fullview.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
        Source: C:\Users\user\Music\fullview.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
        Source: C:\Users\user\Music\fullview.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
        Source: C:\Users\user\Music\fullview.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
        Source: C:\Users\user\Music\fullview.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
        Source: C:\Users\user\Music\fullview.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
        Source: C:\Users\user\Music\fullview.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
        Source: C:\Users\user\Music\fullview.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct

        Stealing of Sensitive Information:

        barindex
        Yara detected NjratShow sources
        Source: Yara matchFile source: 0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.900690082.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.817394894.00000000046A7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.756321021.000000000320B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.681356331.0000000003C47000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.756794475.0000000003FB7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.813989539.00000000034C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.821203720.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.796452577.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.829265628.0000000003691000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.755773699.0000000002DD1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.837153151.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.830327224.0000000003DE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.831852482.0000000004877000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.829183550.0000000002E26000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.828936006.0000000002C18000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.680120099.0000000002A61000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe PID: 6964, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 7088, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 1668, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 5616, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 7080, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 5544, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 6400, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4576, type: MEMORY
        Source: Yara matchFile source: 12.2.fullview.exe.46a7ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.46a7ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.351dc45.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36e488d.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e2916d.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c4edb9.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.3de7ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c62b08.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4877ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.3fb7ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e3cebc.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.3de7ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.3fb7ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36e488d.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.fullview.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c62b08.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.fullview.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.fullview.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.3531994.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4877ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e3cebc.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.0.fullview.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.fullview.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c4edb9.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.fullview.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36f85dc.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.3531994.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36f85dc.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.351dc45.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e2916d.2.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Yara detected NjratShow sources
        Source: Yara matchFile source: 0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.900690082.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.817394894.00000000046A7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.756321021.000000000320B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.681356331.0000000003C47000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.756794475.0000000003FB7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.813989539.00000000034C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.821203720.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.796452577.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.829265628.0000000003691000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.755773699.0000000002DD1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.837153151.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.830327224.0000000003DE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.831852482.0000000004877000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.829183550.0000000002E26000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.828936006.0000000002C18000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.680120099.0000000002A61000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe PID: 6964, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 7088, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 1668, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 5616, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 7080, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 5544, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: fullview.exe PID: 6400, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4576, type: MEMORY
        Source: Yara matchFile source: 12.2.fullview.exe.46a7ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.46a7ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.351dc45.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36e488d.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e2916d.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c4edb9.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.3de7ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c62b08.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ac84f0.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4877ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.3fb7ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e3cebc.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.3de7ead.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.3fb7ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36e488d.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.2ab47a1.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.fullview.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c62b08.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.fullview.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.fullview.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.3531994.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.4877ead.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e3cebc.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.0.fullview.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.fullview.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.fullview.exe.2c4edb9.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.fullview.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36f85dc.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.3531994.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.svchost.exe.36f85dc.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.fullview.exe.351dc45.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.fullview.exe.2e2916d.2.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation1Startup Items1Startup Items1Disable or Modify Tools1Input Capture11File and Directory Discovery2Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsNative API1Registry Run Keys / Startup Folder121Access Token Manipulation1Deobfuscate/Decode Files or Information1LSASS MemorySystem Information Discovery12Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Process Injection112Obfuscated Files or Information2Security Account ManagerSecurity Software Discovery131SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol21Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Registry Run Keys / Startup Folder121Software Packing13NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptFile Deletion1LSA SecretsVirtualization/Sandbox Evasion31SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading111Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion31DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection112/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
        Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories2Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 433010 Sample: 4714D68DBB9F9AC36425F2EC73E... Startdate: 11/06/2021 Architecture: WINDOWS Score: 100 38 strangerstrek.duckdns.org 2->38 50 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 13 other signatures 2->56 8 explorer.exe 2->8         started        10 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe 16 2->10         started        14 fullview.exe 2->14         started        16 6 other processes 2->16 signatures3 process4 file5 18 fullview.exe 1 8 8->18         started        32 C:\Users\user\Music\fullview.exe, PE32 10->32 dropped 34 4714D68DBB9F9AC364...7407F36063C.exe.log, ASCII 10->34 dropped 58 Hides that the sample has been downloaded from the Internet (zone.identifier) 10->58 21 explorer.exe 1 10->21         started        60 Injects a PE file into a foreign processes 14->60 23 fullview.exe 14->23         started        25 fullview.exe 16->25         started        signatures6 process7 signatures8 42 Antivirus detection for dropped file 18->42 44 Multi AV Scanner detection for dropped file 18->44 46 Machine Learning detection for dropped file 18->46 48 4 other signatures 18->48 27 fullview.exe 3 5 18->27         started        process9 dnsIp10 40 strangerstrek.duckdns.org 192.169.69.25, 2090, 49768, 49769 WOWUS United States 27->40 36 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32 27->36 dropped 62 Changes the view of files in windows explorer (hidden files and folders) 27->62 file11 signatures12

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe67%VirustotalBrowse
        4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe79%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
        4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe100%AviraHEUR/AGEN.1122310
        4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\Music\fullview.exe100%AviraHEUR/AGEN.1122310
        C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe100%AviraHEUR/AGEN.1122310
        C:\Users\user\Music\fullview.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe79%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
        C:\Users\user\Music\fullview.exe79%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        11.0.fullview.exe.dc0000.2.unpack100%AviraHEUR/AGEN.1122310Download File
        11.0.fullview.exe.dc0000.0.unpack100%AviraHEUR/AGEN.1122310Download File
        18.2.fullview.exe.d30000.1.unpack100%AviraHEUR/AGEN.1122310Download File
        12.0.fullview.exe.d30000.0.unpack100%AviraHEUR/AGEN.1122310Download File
        4.2.fullview.exe.740000.0.unpack100%AviraHEUR/AGEN.1122310Download File
        12.2.fullview.exe.46a7ead.7.unpack100%AviraHEUR/AGEN.1110362Download File
        13.0.fullview.exe.580000.0.unpack100%AviraHEUR/AGEN.1122310Download File
        0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3c47ead.7.unpack100%AviraHEUR/AGEN.1110362Download File
        16.0.fullview.exe.d40000.0.unpack100%AviraHEUR/AGEN.1122310Download File
        4.0.fullview.exe.740000.0.unpack100%AviraHEUR/AGEN.1122310Download File
        17.0.svchost.exe.980000.0.unpack100%AviraHEUR/AGEN.1122310Download File
        13.2.fullview.exe.3de7ead.7.unpack100%AviraHEUR/AGEN.1110362Download File
        13.2.fullview.exe.580000.0.unpack100%AviraHEUR/AGEN.1122310Download File
        16.0.fullview.exe.d40000.2.unpack100%AviraHEUR/AGEN.1122310Download File
        4.2.fullview.exe.3fb7ead.7.unpack100%AviraHEUR/AGEN.1110362Download File
        18.0.fullview.exe.d30000.0.unpack100%AviraHEUR/AGEN.1122310Download File
        11.2.fullview.exe.dc0000.1.unpack100%AviraHEUR/AGEN.1122310Download File
        0.0.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3d0000.0.unpack100%AviraHEUR/AGEN.1122310Download File
        17.2.svchost.exe.980000.0.unpack100%AviraHEUR/AGEN.1122310Download File
        16.2.fullview.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File
        0.2.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.3d0000.0.unpack100%AviraHEUR/AGEN.1122310Download File
        18.2.fullview.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File
        16.0.fullview.exe.400000.1.unpack100%AviraTR/Dropper.GenDownload File
        17.2.svchost.exe.4877ead.7.unpack100%AviraHEUR/AGEN.1110362Download File
        16.2.fullview.exe.d40000.1.unpack100%AviraHEUR/AGEN.1122310Download File
        18.0.fullview.exe.400000.1.unpack100%AviraTR/Dropper.GenDownload File
        11.0.fullview.exe.400000.1.unpack100%AviraTR/Dropper.GenDownload File
        12.2.fullview.exe.d30000.0.unpack100%AviraHEUR/AGEN.1122310Download File
        18.0.fullview.exe.d30000.2.unpack100%AviraHEUR/AGEN.1122310Download File
        11.2.fullview.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File

        Domains

        SourceDetectionScannerLabelLink
        strangerstrek.duckdns.org0%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.fonts.comicj0%Avira URL Cloudsafe
        True0%Avira URL Cloudsafe
        http://ns.adobe.co0%VirustotalBrowse
        http://ns.adobe.co0%Avira URL Cloudsafe
        http://ns.adom0%Avira URL Cloudsafe
        http://www.tiro.comadnl0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.carterandcone.comCInN0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/staff/dennis.htm00%Avira URL Cloudsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://ns.micro0%Avira URL Cloudsafe
        http://ns.adob0%Avira URL Cloudsafe
        http://www.carterandcone.comh-c0%Avira URL Cloudsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://ns.ado0%Avira URL Cloudsafe
        http://www.founder.com.cn/cns0%Avira URL Cloudsafe
        http://www.carterandcone.com=0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.tiro.com&0%Avira URL Cloudsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.de0%URL Reputationsafe
        http://www.urwpp.de0%URL Reputationsafe
        http://www.urwpp.de0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htmX0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://ns.adobe.c0%Avira URL Cloudsafe
        http://www.fonts.comQ0%Avira URL Cloudsafe
        http://www.microsoft.0%URL Reputationsafe
        http://www.microsoft.0%URL Reputationsafe
        http://www.microsoft.0%URL Reputationsafe
        http://www.tiro.comlic0%URL Reputationsafe
        http://www.tiro.comlic0%URL Reputationsafe
        http://www.tiro.comlic0%URL Reputationsafe
        http://www.goodfont.co.krO0%Avira URL Cloudsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.tiro.0%URL Reputationsafe
        http://www.tiro.0%URL Reputationsafe
        http://www.tiro.0%URL Reputationsafe
        http://www.carterandcone.comyrl0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn70%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.carterandcone.comcro0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        strangerstrek.duckdns.org
        192.169.69.25
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        Truetrue
        • Avira URL Cloud: safe
        low

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.fontbureau.com/designersG4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
          high
          http://www.fontbureau.com/designers/?4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
            high
            http://www.founder.com.cn/cn/bThe4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.fonts.comicj4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.635626829.000000000509B000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://ns.adobe.cofullview.exe, 00000004.00000003.753222861.0000000005433000.00000004.00000001.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://ns.adomfullview.exe, 0000000C.00000003.811336680.0000000005A4D000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designers?4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
              high
              https://corp.roblox.com/contact/svchost.exe, 00000009.00000003.736811427.00000231CFB9F000.00000004.00000001.sdmp, svchost.exe, 00000009.00000003.736758526.00000231CFB94000.00000004.00000001.sdmpfalse
                high
                http://www.tiro.comadnl4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637155791.0000000005083000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.tiro.comsvchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designerssvchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                  high
                  http://www.carterandcone.comCInN4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637436308.0000000005088000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.galapagosdesign.com/staff/dennis.htm04714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.641328281.0000000005086000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.goodfont.co.kr4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636489484.0000000005082000.00000004.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.carterandcone.com4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637470883.0000000005088000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://ns.microfullview.exe, 00000004.00000003.753222861.0000000005433000.00000004.00000001.sdmp, fullview.exe, 00000004.00000003.688463111.000000000542D000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.com/designersN4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.639326811.0000000005086000.00000004.00000001.sdmpfalse
                    high
                    http://ns.adobfullview.exe, 00000004.00000003.753222861.0000000005433000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.carterandcone.comh-c4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637522421.0000000005088000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.sajatypeworks.com4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636768655.0000000005083000.00000004.00000001.sdmp, 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netD4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/cThe4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.g5e.com/G5_End_User_License_Supplemental_Termssvchost.exe, 00000009.00000003.728657876.00000231CFB8C000.00000004.00000001.sdmpfalse
                      high
                      http://www.galapagosdesign.com/staff/dennis.htm4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.com4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://ns.adofullview.exe, 0000000C.00000003.746795395.0000000005A4D000.00000004.00000001.sdmp, fullview.exe, 0000000C.00000003.746606206.0000000005A4D000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.founder.com.cn/cns4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636890228.0000000005084000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.carterandcone.com=4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637470883.0000000005088000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.galapagosdesign.com/DPlease4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.com4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.635522881.000000000509B000.00000004.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                        high
                        http://www.sandoll.co.kr4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636489484.0000000005082000.00000004.00000001.sdmp, 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.tiro.com&4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637627152.0000000005088000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        https://en.help.roblox.com/hc/en-ussvchost.exe, 00000009.00000003.736811427.00000231CFB9F000.00000004.00000001.sdmp, svchost.exe, 00000009.00000003.736758526.00000231CFB94000.00000004.00000001.sdmpfalse
                          high
                          http://www.urwpp.deDPlease4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.de4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.640449829.0000000005086000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cn4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.sakkal.com4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmX4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.641286865.0000000005085000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.04714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                            high
                            http://www.fontbureau.com4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                              high
                              http://www.galapagosdesign.com/4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.641286865.0000000005085000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventuresvchost.exe, 00000009.00000003.728657876.00000231CFB8C000.00000004.00000001.sdmpfalse
                                high
                                http://www.carterandcone.comTC4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637571579.0000000005088000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://ns.adobe.cfullview.exe, 00000004.00000003.688463111.000000000542D000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://www.roblox.com/developsvchost.exe, 00000009.00000003.736811427.00000231CFB9F000.00000004.00000001.sdmp, svchost.exe, 00000009.00000003.736758526.00000231CFB94000.00000004.00000001.sdmpfalse
                                  high
                                  https://www.youtube.com/watch?v=Ji9IwPId5UkQThis4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.681356331.0000000003C47000.00000004.00000001.sdmp, fullview.exe, 00000004.00000002.756321021.000000000320B000.00000004.00000001.sdmp, fullview.exe, 0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmp, fullview.exe, 0000000C.00000002.813989539.00000000034C1000.00000004.00000001.sdmp, fullview.exe, 0000000D.00000002.830327224.0000000003DE7000.00000004.00000001.sdmp, fullview.exe, 00000010.00000002.821203720.0000000000402000.00000040.00000001.sdmp, svchost.exe, 00000011.00000002.829265628.0000000003691000.00000004.00000001.sdmp, fullview.exe, 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmpfalse
                                    high
                                    http://www.fonts.comQ4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.635541486.000000000509B000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.microsoft.svchost.exe, 00000009.00000002.751687464.00000231CF2EE000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.tiro.comlic4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637627152.0000000005088000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.goodfont.co.krO4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636489484.0000000005082000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://corp.roblox.com/parents/svchost.exe, 00000009.00000003.736811427.00000231CFB9F000.00000004.00000001.sdmp, svchost.exe, 00000009.00000003.736758526.00000231CFB94000.00000004.00000001.sdmp, svchost.exe, 00000009.00000003.736861958.00000231CFB41000.00000004.00000001.sdmp, svchost.exe, 00000009.00000003.736891454.00000231CFB50000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.carterandcone.coml4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.tiro.4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637170702.0000000005082000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.carterandcone.comyrl4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637389364.0000000005089000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designers/cabarga.htmlN4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.founder.com.cn/cn4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636982622.00000000050BD000.00000004.00000001.sdmp, 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636890228.0000000005084000.00000004.00000001.sdmp, 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636768655.0000000005083000.00000004.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/frere-user.html4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.639668812.0000000005087000.00000004.00000001.sdmp, 4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cn74714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.636923218.00000000050BD000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers84714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000002.682796551.0000000005230000.00000002.00000001.sdmp, fullview.exe, 00000004.00000002.757479680.0000000005590000.00000002.00000001.sdmp, fullview.exe, 0000000C.00000002.818003800.0000000005D20000.00000002.00000001.sdmp, fullview.exe, 0000000D.00000002.831503249.0000000005480000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.832439838.0000000005FA0000.00000002.00000001.sdmpfalse
                                            high
                                            https://www.roblox.com/info/privacysvchost.exe, 00000009.00000003.736811427.00000231CFB9F000.00000004.00000001.sdmp, svchost.exe, 00000009.00000003.736758526.00000231CFB94000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.carterandcone.comcro4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.637571579.0000000005088000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.g5e.com/termsofservicesvchost.exe, 00000009.00000003.728657876.00000231CFB8C000.00000004.00000001.sdmpfalse
                                                high
                                                http://www.fontbureau.com/designers54714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe, 00000000.00000003.638929660.0000000005087000.00000004.00000001.sdmpfalse
                                                  high

                                                  Contacted IPs

                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs

                                                  Public

                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  192.169.69.25
                                                  strangerstrek.duckdns.orgUnited States
                                                  23033WOWUStrue

                                                  General Information

                                                  Joe Sandbox Version:32.0.0 Black Diamond
                                                  Analysis ID:433010
                                                  Start date:11.06.2021
                                                  Start time:05:07:11
                                                  Joe Sandbox Product:CloudBasic
                                                  Overall analysis duration:0h 13m 17s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:light
                                                  Sample file name:4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                  Number of analysed new started processes analysed:20
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • HDC enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Detection:MAL
                                                  Classification:mal100.troj.adwa.spyw.evad.winEXE@19/16@16/1
                                                  EGA Information:Failed
                                                  HDC Information:
                                                  • Successful, ratio: 0.8% (good quality ratio 0.2%)
                                                  • Quality average: 25.2%
                                                  • Quality standard deviation: 38.5%
                                                  HCA Information:
                                                  • Successful, ratio: 96%
                                                  • Number of executed functions: 0
                                                  • Number of non-executed functions: 0
                                                  Cookbook Comments:
                                                  • Adjust boot time
                                                  • Enable AMSI
                                                  • Found application associated with file extension: .exe
                                                  Warnings:
                                                  Show All
                                                  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, wuapihost.exe
                                                  • Excluded IPs from analysis (whitelisted): 52.113.196.254, 52.147.198.201, 13.88.21.125, 104.43.139.144, 20.82.209.183, 20.54.104.15, 20.54.26.129, 20.54.7.98, 2.20.142.210, 2.20.142.209, 8.253.204.121, 8.253.207.120, 67.26.81.254, 8.248.137.254, 8.248.143.254, 20.82.210.154, 92.122.213.247, 92.122.213.194, 20.82.209.104
                                                  • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, iris-de-ppe-azsc-neu.northeurope.cloudapp.azure.com, teams-9999.teams-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, teams-ring.teams-9999.teams-msedge.net, teams-ring.msedge.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, neu-consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net
                                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.

                                                  Simulations

                                                  Behavior and APIs

                                                  TimeTypeDescription
                                                  05:08:35API Interceptor10x Sleep call for process: svchost.exe modified
                                                  05:08:35AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run fullview C:\Users\user\Music\fullview.exe -boot
                                                  05:08:43AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run fullview C:\Users\user\Music\fullview.exe -boot
                                                  05:09:01AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe

                                                  Joe Sandbox View / Context

                                                  IPs

                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                  192.169.69.2566D9612BA9CDE67EDEA09F3482459F3BFE03FAAA13EAD.exeGet hashmaliciousBrowse
                                                  • ipvhosted.duckdns.org/rmarch/fre.php
                                                  ttmPnejtED.jsGet hashmaliciousBrowse
                                                  • pluginsrv.duckdns.org:7744/is-ready
                                                  New Order.xlsxGet hashmaliciousBrowse
                                                  • systemserverrootmapforfiletrn.duckdns.org/explorer/black.exe
                                                  Your Transport Plan has Changed - Maersk.xlsxGet hashmaliciousBrowse
                                                  • covidinternationalspreadsoomuchtruehead.duckdns.org/covid/blk.exe
                                                  XQqVczq7eQ.exeGet hashmaliciousBrowse
                                                  • wetransferfax.duckdns.org/sftp.exe
                                                  http://office365update.duckdns.orgGet hashmaliciousBrowse
                                                  • office365update.duckdns.org/
                                                  TUdme7rF2G.rtfGet hashmaliciousBrowse
                                                  • wsdykungcommunicationtarisupliermg55gms.duckdns.org/kungdoc/winlog.exe
                                                  http://communicationideadedicatedserversystem.duckdns.org/bns/vbc.exeGet hashmaliciousBrowse
                                                  • communicationideadedicatedserversystem.duckdns.org/bns/vbc.exe
                                                  doc04483720200602121810.xlsxGet hashmaliciousBrowse
                                                  • honeysposecurityfileexchangeservice.duckdns.org/org/vbc.exe
                                                  doc04483720200602121810.xlsxGet hashmaliciousBrowse
                                                  • honeysposecurityfileexchangeservice.duckdns.org/org/vbc.exe
                                                  BBVA-Confirming Facturas Pagadas al Vencimiento.xlsxGet hashmaliciousBrowse
                                                  • mkpksb2overhypetheykillppelforlifehelgg.duckdns.org/mkpk2doc/regasm.exe
                                                  VqtnFLslNj_Purchase Order.vbsGet hashmaliciousBrowse
                                                  • onyeeze.duckdns.org:5000/is-ready
                                                  1.bin.jsGet hashmaliciousBrowse
                                                  • unknownsoft.duckdns.org:7755/is-ready
                                                  Doc1.mhtGet hashmaliciousBrowse
                                                  • pluginsrv2.duckdns.org:8899/is-ready
                                                  https://cdn.discordapp.com/attachments/692273473430749187/695380419897458718/RFQ.tar.gzGet hashmaliciousBrowse
                                                  • pluginsrv2.duckdns.org:8000/is-ready
                                                  http://systemserverrootmapforfiletrn.duckdns.org/explorer/black.exeGet hashmaliciousBrowse
                                                  • systemserverrootmapforfiletrn.duckdns.org/explorer/black.exe
                                                  help.wsfGet hashmaliciousBrowse
                                                  • postventa-vodafone.duckdns.org/is-ready
                                                  order.xlsxGet hashmaliciousBrowse
                                                  • windowsfirewallsecurityauthorise.duckdns.org/big/svch.html
                                                  order.xlsxGet hashmaliciousBrowse
                                                  • windowsfirewallsecurityauthorise.duckdns.org/big/svch.html
                                                  54RFQ EU (190926) CRYPTED.jsGet hashmaliciousBrowse
                                                  • pluginsrv1.duckdns.org:7757/is-ready

                                                  Domains

                                                  No context

                                                  ASN

                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                  WOWUSORDER-6010.pdf.exeGet hashmaliciousBrowse
                                                  • 192.169.69.25
                                                  9CCC5F07D0BF7152841C893C892DF407C854D5FF45C1A.exeGet hashmaliciousBrowse
                                                  • 192.169.69.26
                                                  0F4F0709D120ABA22D4687BFABFA5004DD54B0FCC6EF1.exeGet hashmaliciousBrowse
                                                  • 192.169.69.25
                                                  WNr7kU4wSU.exeGet hashmaliciousBrowse
                                                  • 192.169.69.26
                                                  2ga2LylVIM.exeGet hashmaliciousBrowse
                                                  • 192.169.69.25
                                                  AFa8kUgrni.exeGet hashmaliciousBrowse
                                                  • 192.169.69.25
                                                  u8SFl9j1I8.exeGet hashmaliciousBrowse
                                                  • 45.14.115.62
                                                  66D9612BA9CDE67EDEA09F3482459F3BFE03FAAA13EAD.exeGet hashmaliciousBrowse
                                                  • 192.169.69.25
                                                  68815FD1B30680F0810F01B9D651B31995E2DBCE667D2.exeGet hashmaliciousBrowse
                                                  • 192.169.69.25
                                                  export of document 555091.xlsmGet hashmaliciousBrowse
                                                  • 216.244.77.186
                                                  generated purchase order 6149057.xlsmGet hashmaliciousBrowse
                                                  • 216.244.77.186
                                                  export of check 209162.xlsmGet hashmaliciousBrowse
                                                  • 216.244.77.186
                                                  copy of payment 0535.xlsmGet hashmaliciousBrowse
                                                  • 216.244.77.186
                                                  scan of document 8030.xlsmGet hashmaliciousBrowse
                                                  • 216.244.77.186
                                                  fax_74557.xlsmGet hashmaliciousBrowse
                                                  • 216.244.77.186
                                                  CMjsfg603M.exeGet hashmaliciousBrowse
                                                  • 192.169.69.25
                                                  619DBBJxtN.exeGet hashmaliciousBrowse
                                                  • 192.169.69.25
                                                  TCyJbxozes.xlsmGet hashmaliciousBrowse
                                                  • 216.244.65.162
                                                  TCyJbxozes.xlsmGet hashmaliciousBrowse
                                                  • 216.244.65.162
                                                  documents-1731157050.xlsmGet hashmaliciousBrowse
                                                  • 216.244.65.162

                                                  JA3 Fingerprints

                                                  No context

                                                  Dropped Files

                                                  No context

                                                  Created / dropped Files

                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe.log
                                                  Process:C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):506
                                                  Entropy (8bit):5.243697660922101
                                                  Encrypted:false
                                                  SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70U26KPZb6Khav:MLF20NaL329hJ5g522rW26KUKhk
                                                  MD5:2DE73C34B5DFB4A6363AAA6CC0236D40
                                                  SHA1:3FB7418FBD86A4FC2F47DA2B9D50AE5920F87BFE
                                                  SHA-256:20CD6E9106E3672979DA34DAB605DFC4485AD2103BAC8924F49CCEF4AC98D1A5
                                                  SHA-512:58CA38D9403B18E7DEB762C05FF8E3AEF48A1369A1331D886EB3050750778D5332FAA0272B51E53506B819439672C1872DE2B9CB0B3E149DE38374960B05B50D
                                                  Malicious:true
                                                  Reputation:low
                                                  Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Core\1dcb6d1a15814b6b26f32879e7ec1d98\System.Core.ni.dll",0..
                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\fullview.exe.log
                                                  Process:C:\Users\user\Music\fullview.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):506
                                                  Entropy (8bit):5.243697660922101
                                                  Encrypted:false
                                                  SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70U26KPZb6Khav:MLF20NaL329hJ5g522rW26KUKhk
                                                  MD5:2DE73C34B5DFB4A6363AAA6CC0236D40
                                                  SHA1:3FB7418FBD86A4FC2F47DA2B9D50AE5920F87BFE
                                                  SHA-256:20CD6E9106E3672979DA34DAB605DFC4485AD2103BAC8924F49CCEF4AC98D1A5
                                                  SHA-512:58CA38D9403B18E7DEB762C05FF8E3AEF48A1369A1331D886EB3050750778D5332FAA0272B51E53506B819439672C1872DE2B9CB0B3E149DE38374960B05B50D
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Core\1dcb6d1a15814b6b26f32879e7ec1d98\System.Core.ni.dll",0..
                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\svchost.exe.log
                                                  Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):506
                                                  Entropy (8bit):5.243697660922101
                                                  Encrypted:false
                                                  SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70U26KPZb6Khav:MLF20NaL329hJ5g522rW26KUKhk
                                                  MD5:2DE73C34B5DFB4A6363AAA6CC0236D40
                                                  SHA1:3FB7418FBD86A4FC2F47DA2B9D50AE5920F87BFE
                                                  SHA-256:20CD6E9106E3672979DA34DAB605DFC4485AD2103BAC8924F49CCEF4AC98D1A5
                                                  SHA-512:58CA38D9403B18E7DEB762C05FF8E3AEF48A1369A1331D886EB3050750778D5332FAA0272B51E53506B819439672C1872DE2B9CB0B3E149DE38374960B05B50D
                                                  Malicious:false
                                                  Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Core\1dcb6d1a15814b6b26f32879e7ec1d98\System.Core.ni.dll",0..
                                                  C:\Users\user\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.new
                                                  Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):814
                                                  Entropy (8bit):3.167885907884326
                                                  Encrypted:false
                                                  SSDEEP:24:vqrOr+VACxmM7CkGcLWb2cLbMqlkGcLWb2cLb:voOrSACxmM7pHWb3bMNHWb3b
                                                  MD5:CD424EB5C932D52634D00281C306EFD8
                                                  SHA1:C5DD42A3A24112EFE8BCC6BB08E5F8B7B867E8A3
                                                  SHA-256:49D8AC7F3741C2C798A24ED0297ACB7D0B0591C62FFB5D25F0C9D4894600BC37
                                                  SHA-512:930883496C51CF11122EBDDEBD26A3E91E3AAD92E7F7205722EEF1264C38550E7DE75BC3D269AFE51742835E841C75AE0D6B507B7FE7C180904BBA7FFF749CB3
                                                  Malicious:false
                                                  Preview: ....................f.i.l.e.:./././.C.:./.U.s.e.r.s./.j.o.n.e.s./.A.p.p.D.a.t.a./.R.o.a.m.i.n.g./.M.i.c.r.o.s.o.f.t./.W.i.n.d.o.w.s./.S.t.a.r.t. .M.e.n.u./.P.r.o.g.r.a.m.s./.S.t.a.r.t.u.p./.s.v.c.h.o.s.t...e.x.e.....P.o.l.i.c.y.S.t.a.t.e.m.e.n.t....v.e.r.s.i.o.n...1....P.e.r.m.i.s.s.i.o.n.S.e.t....c.l.a.s.s...S.y.s.t.e.m...S.e.c.u.r.i.t.y...P.e.r.m.i.s.s.i.o.n.S.e.t....v.e.r.s.i.o.n...1....U.n.r.e.s.t.r.i.c.t.e.d...t.r.u.e................\...............f.i.l.e.:./././.C.:./.U.s.e.r.s./.j.o.n.e.s./.M.u.s.i.c./.f.u.l.l.v.i.e.w...e.x.e.....P.o.l.i.c.y.S.t.a.t.e.m.e.n.t....v.e.r.s.i.o.n...1....P.e.r.m.i.s.s.i.o.n.S.e.t....c.l.a.s.s...S.y.s.t.e.m...S.e.c.u.r.i.t.y...P.e.r.m.i.s.s.i.o.n.S.e.t....v.e.r.s.i.o.n...1....U.n.r.e.s.t.r.i.c.t.e.d...t.r.u.e............................................b.U.,..........
                                                  C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
                                                  Process:C:\Users\user\Music\fullview.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):676608
                                                  Entropy (8bit):7.265789074193961
                                                  Encrypted:false
                                                  SSDEEP:12288:xoxaLRopZpV0cs6jbfYKA/uxqxxHdRetMYxj3N5HzjfB:exaLRUZ/PvAK7x+dRetMgj3N5Hzl
                                                  MD5:4DF9B2C6531CDE226BF1B0AE86D41162
                                                  SHA1:9A42C49714905EA1E5F042A683FD80ECFF10FC87
                                                  SHA-256:4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C391E0BFBB9D0B96BBF9
                                                  SHA-512:292EDF0D733D05B3B725EA00414299C6CCEC8D50DA9E0CE3D50CAFBF4144E87D3E62DCDADB11A2B139E39F8A72CB5E394BD108E6D4413517CCA459079DF6BA8D
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 79%
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......Y................................. ........@.. ....................... ............@.....................................O.......P............................................................................ ............... ..H............text........ ...................... ..`.rsrc...P...........................@..@.reloc..............................@..B........................H.......L...p ......!....O...E...........................................0..A....... .........%.....(......... .........%.....(.........(,...*.....&*...R.(.....(....*.....&*..... .... ....(9...(#...(.... .... ....(...+o....Q*.....&*.0..$.........(.....%......s......o....&*.....&*b. .... ....(...+*.....&*....0..f.......~........E....-..............."............,...+..+..{....,...+...q. .b..Y+..{....o......(....*.....&*...0..........~........E................g...........6.....
                                                  C:\Users\user\Music\fullview.exe
                                                  Process:C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):676608
                                                  Entropy (8bit):7.265789074193961
                                                  Encrypted:false
                                                  SSDEEP:12288:xoxaLRopZpV0cs6jbfYKA/uxqxxHdRetMYxj3N5HzjfB:exaLRUZ/PvAK7x+dRetMgj3N5Hzl
                                                  MD5:4DF9B2C6531CDE226BF1B0AE86D41162
                                                  SHA1:9A42C49714905EA1E5F042A683FD80ECFF10FC87
                                                  SHA-256:4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C391E0BFBB9D0B96BBF9
                                                  SHA-512:292EDF0D733D05B3B725EA00414299C6CCEC8D50DA9E0CE3D50CAFBF4144E87D3E62DCDADB11A2B139E39F8A72CB5E394BD108E6D4413517CCA459079DF6BA8D
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 79%
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......Y................................. ........@.. ....................... ............@.....................................O.......P............................................................................ ............... ..H............text........ ...................... ..`.rsrc...P...........................@..@.reloc..............................@..B........................H.......L...p ......!....O...E...........................................0..A....... .........%.....(......... .........%.....(.........(,...*.....&*...R.(.....(....*.....&*..... .... ....(9...(#...(.... .... ....(...+o....Q*.....&*.0..$.........(.....%......s......o....&*.....&*b. .... ....(...+*.....&*....0..f.......~........E....-..............."............,...+..+..{....,...+...q. .b..Y+..{....o......(....*.....&*...0..........~........E................g...........6.....
                                                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new
                                                  Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1220
                                                  Entropy (8bit):3.3063592917134037
                                                  Encrypted:false
                                                  SSDEEP:24:vqrOr+VACxmM7CkGcLWb2cLbMqlkGcLWb2cLbqqsERH28kGcLWb2cLb:voOrSACxmM7pHWb3bMNHWb3bq+QHWb3b
                                                  MD5:859781EA37E2E022A9A82A6CF11FB8C0
                                                  SHA1:C499451692C7C553D3C5C21E7E8E9120734A2A05
                                                  SHA-256:08A8B7206491A4A23673C26BA30006881FB6D37CB436DE1F7C126D4EEF37BAA2
                                                  SHA-512:29DA47BEB9464A588C721F7CF9DDF276E7DF09497F193F5104D2C1AE30838BEACE0E43797D1ACDA7F7EC086B1642D68547822022C470D5361E9938F58A02EFF2
                                                  Malicious:false
                                                  Preview: ....................f.i.l.e.:./././.C.:./.U.s.e.r.s./.j.o.n.e.s./.A.p.p.D.a.t.a./.R.o.a.m.i.n.g./.M.i.c.r.o.s.o.f.t./.W.i.n.d.o.w.s./.S.t.a.r.t. .M.e.n.u./.P.r.o.g.r.a.m.s./.S.t.a.r.t.u.p./.s.v.c.h.o.s.t...e.x.e.....P.o.l.i.c.y.S.t.a.t.e.m.e.n.t....v.e.r.s.i.o.n...1....P.e.r.m.i.s.s.i.o.n.S.e.t....c.l.a.s.s...S.y.s.t.e.m...S.e.c.u.r.i.t.y...P.e.r.m.i.s.s.i.o.n.S.e.t....v.e.r.s.i.o.n...1....U.n.r.e.s.t.r.i.c.t.e.d...t.r.u.e................\...............f.i.l.e.:./././.C.:./.U.s.e.r.s./.j.o.n.e.s./.M.u.s.i.c./.f.u.l.l.v.i.e.w...e.x.e.....P.o.l.i.c.y.S.t.a.t.e.m.e.n.t....v.e.r.s.i.o.n...1....P.e.r.m.i.s.s.i.o.n.S.e.t....c.l.a.s.s...S.y.s.t.e.m...S.e.c.u.r.i.t.y...P.e.r.m.i.s.s.i.o.n.S.e.t....v.e.r.s.i.o.n...1....U.n.r.e.s.t.r.i.c.t.e.d...t.r.u.e................................f.i.l.e.:./././.C.:./.U.s.e.r.s./.j.o.n.e.s./.D.e.s.k.t.o.p./.4.7.1.4.D.6.8.D.B.B.9.F.9.A.C.3.6.4.2.5.F.2.E.C.7.3.E.D.4.3.4.C.F.5.7.4.0.7.F.3.6.0.6.3.C...e.x.e.....P.o.l.i.c.y.S.t.a.t.e.m.e.n.t....v.e.r.s.i.o.n...1
                                                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new
                                                  Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1220
                                                  Entropy (8bit):3.3063592917134037
                                                  Encrypted:false
                                                  SSDEEP:24:vqrOr+VACxmM7CkGcLWb2cLbMqlkGcLWb2cLbqqsERH28kGcLWb2cLb:voOrSACxmM7pHWb3bMNHWb3bq+QHWb3b
                                                  MD5:859781EA37E2E022A9A82A6CF11FB8C0
                                                  SHA1:C499451692C7C553D3C5C21E7E8E9120734A2A05
                                                  SHA-256:08A8B7206491A4A23673C26BA30006881FB6D37CB436DE1F7C126D4EEF37BAA2
                                                  SHA-512:29DA47BEB9464A588C721F7CF9DDF276E7DF09497F193F5104D2C1AE30838BEACE0E43797D1ACDA7F7EC086B1642D68547822022C470D5361E9938F58A02EFF2
                                                  Malicious:false
                                                  Preview: ....................f.i.l.e.:./././.C.:./.U.s.e.r.s./.j.o.n.e.s./.A.p.p.D.a.t.a./.R.o.a.m.i.n.g./.M.i.c.r.o.s.o.f.t./.W.i.n.d.o.w.s./.S.t.a.r.t. .M.e.n.u./.P.r.o.g.r.a.m.s./.S.t.a.r.t.u.p./.s.v.c.h.o.s.t...e.x.e.....P.o.l.i.c.y.S.t.a.t.e.m.e.n.t....v.e.r.s.i.o.n...1....P.e.r.m.i.s.s.i.o.n.S.e.t....c.l.a.s.s...S.y.s.t.e.m...S.e.c.u.r.i.t.y...P.e.r.m.i.s.s.i.o.n.S.e.t....v.e.r.s.i.o.n...1....U.n.r.e.s.t.r.i.c.t.e.d...t.r.u.e................\...............f.i.l.e.:./././.C.:./.U.s.e.r.s./.j.o.n.e.s./.M.u.s.i.c./.f.u.l.l.v.i.e.w...e.x.e.....P.o.l.i.c.y.S.t.a.t.e.m.e.n.t....v.e.r.s.i.o.n...1....P.e.r.m.i.s.s.i.o.n.S.e.t....c.l.a.s.s...S.y.s.t.e.m...S.e.c.u.r.i.t.y...P.e.r.m.i.s.s.i.o.n.S.e.t....v.e.r.s.i.o.n...1....U.n.r.e.s.t.r.i.c.t.e.d...t.r.u.e................................f.i.l.e.:./././.C.:./.U.s.e.r.s./.j.o.n.e.s./.D.e.s.k.t.o.p./.4.7.1.4.D.6.8.D.B.B.9.F.9.A.C.3.6.4.2.5.F.2.E.C.7.3.E.D.4.3.4.C.F.5.7.4.0.7.F.3.6.0.6.3.C...e.x.e.....P.o.l.i.c.y.S.t.a.t.e.m.e.n.t....v.e.r.s.i.o.n...1

                                                  Static File Info

                                                  General

                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.265789074193961
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                  • Win32 Executable (generic) a (10002005/4) 49.96%
                                                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  • DOS Executable Generic (2002/1) 0.01%
                                                  File name:4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe
                                                  File size:676608
                                                  MD5:4df9b2c6531cde226bf1b0ae86d41162
                                                  SHA1:9a42c49714905ea1e5f042a683fd80ecff10fc87
                                                  SHA256:4714d68dbb9f9ac36425f2ec73ed434cf57407f36063c391e0bfbb9d0b96bbf9
                                                  SHA512:292edf0d733d05b3b725ea00414299c6ccec8d50da9e0ce3d50cafbf4144e87d3e62dcdadb11a2b139e39f8a72cb5e394bd108e6d4413517cca459079df6ba8d
                                                  SSDEEP:12288:xoxaLRopZpV0cs6jbfYKA/uxqxxHdRetMYxj3N5HzjfB:exaLRUZ/PvAK7x+dRetMgj3N5Hzl
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......Y................................. ........@.. ....................... ............@................................

                                                  File Icon

                                                  Icon Hash:00828e8e8686b000

                                                  Static PE Info

                                                  General

                                                  Entrypoint:0x48ce0e
                                                  Entrypoint Section:.text
                                                  Digitally signed:true
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                  Time Stamp:0x598DF5B7 [Fri Aug 11 18:21:43 2017 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:v2.0.50727
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                  Authenticode Signature

                                                  Signature Valid:
                                                  Signature Issuer:
                                                  Signature Validation Error:
                                                  Error Number:
                                                  Not Before, Not After
                                                    Subject Chain
                                                      Version:
                                                      Thumbprint MD5:
                                                      Thumbprint SHA-1:
                                                      Thumbprint SHA-256:
                                                      Serial:

                                                      Entrypoint Preview

                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al

                                                      Data Directories

                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x8cdbc0x4f.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x8e0000x750.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x8bc000x19700
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x900000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                      Sections

                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000x8ae140x8b000False0.937953153103data7.9564698476IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                      .rsrc0x8e0000x7500x800False0.37939453125data4.40768498219IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x900000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                      Resources

                                                      NameRVASizeTypeLanguageCountry
                                                      RT_VERSION0x8e0a00x4c4data
                                                      RT_MANIFEST0x8e5640x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                      Imports

                                                      DLLImport
                                                      mscoree.dll_CorExeMain

                                                      Version Infos

                                                      DescriptionData
                                                      Translation0x0000 0x04b0
                                                      LegalCopyrightCopyright 2018 Ames Department Stores, Inc.
                                                      Assembly Version0.0.0.0
                                                      InternalNamezsinnadaverde.exe
                                                      FileVersion18.9.20.3
                                                      CompanyNameAmes Department Stores, Inc.
                                                      Comments2mmzsekqryh
                                                      ProductNameMaintain secure boundaries between Exchange organizations and Active Directory forests
                                                      ProductVersion18.9.20.3
                                                      FileDescriptionMaintain secure boundaries between Exchange organizations and Active Directory forests
                                                      OriginalFilenamezsinnadaverde.exe

                                                      Network Behavior

                                                      Snort IDS Alerts

                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                      06/11/21-05:09:05.658550TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497682090192.168.2.4192.169.69.25
                                                      06/11/21-05:09:08.666842ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                                      06/11/21-05:09:09.625434TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497692090192.168.2.4192.169.69.25
                                                      06/11/21-05:09:13.405936TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497702090192.168.2.4192.169.69.25
                                                      06/11/21-05:09:18.259546TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497712090192.168.2.4192.169.69.25
                                                      06/11/21-05:09:22.130122TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497722090192.168.2.4192.169.69.25
                                                      06/11/21-05:09:25.939244TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497732090192.168.2.4192.169.69.25
                                                      06/11/21-05:09:29.698874TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497742090192.168.2.4192.169.69.25
                                                      06/11/21-05:09:33.589581TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497772090192.168.2.4192.169.69.25
                                                      06/11/21-05:09:37.421430TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497782090192.168.2.4192.169.69.25
                                                      06/11/21-05:09:41.192477TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497792090192.168.2.4192.169.69.25
                                                      06/11/21-05:09:45.021374TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497802090192.168.2.4192.169.69.25
                                                      06/11/21-05:09:48.795325TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497812090192.168.2.4192.169.69.25
                                                      06/11/21-05:09:52.908657TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497822090192.168.2.4192.169.69.25
                                                      06/11/21-05:09:56.927327TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497832090192.168.2.4192.169.69.25
                                                      06/11/21-05:10:00.522464TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497842090192.168.2.4192.169.69.25

                                                      Network Port Distribution

                                                      TCP Packets

                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jun 11, 2021 05:09:04.888365984 CEST497682090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:05.270692110 CEST209049768192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:05.273372889 CEST497682090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:05.658550024 CEST497682090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:06.000242949 CEST209049768192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:09.308514118 CEST497692090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:09.593332052 CEST209049769192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:09.593436003 CEST497692090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:09.625433922 CEST497692090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:09.982062101 CEST209049769192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:13.068901062 CEST497702090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:13.371803045 CEST209049770192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:13.371963024 CEST497702090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:13.405936003 CEST497702090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:13.787329912 CEST209049770192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:17.344278097 CEST497712090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:17.721909046 CEST209049771192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:17.722522020 CEST497712090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:18.259546041 CEST497712090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:18.577558994 CEST209049771192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:21.740449905 CEST497722090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:22.095433950 CEST209049772192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:22.095674992 CEST497722090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:22.130121946 CEST497722090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:22.536426067 CEST209049772192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:25.634933949 CEST497732090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:25.896579981 CEST209049773192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:25.896765947 CEST497732090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:25.939244032 CEST497732090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:26.334356070 CEST209049773192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:29.436384916 CEST497742090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:29.668318033 CEST209049774192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:29.668538094 CEST497742090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:29.698873997 CEST497742090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:30.030806065 CEST209049774192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:33.117090940 CEST497772090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:33.507507086 CEST209049777192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:33.507726908 CEST497772090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:33.589581013 CEST497772090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:33.937946081 CEST209049777192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:37.072197914 CEST497782090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:37.382383108 CEST209049778192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:37.382556915 CEST497782090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:37.421430111 CEST497782090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:37.785609007 CEST209049778192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:40.909295082 CEST497792090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:41.159437895 CEST209049779192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:41.159694910 CEST497792090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:41.192476988 CEST497792090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:41.574688911 CEST209049779192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:44.666002989 CEST497802090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:44.978307962 CEST209049780192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:44.978734016 CEST497802090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:45.021373987 CEST497802090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:45.387738943 CEST209049780192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:48.491094112 CEST497812090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:48.766208887 CEST209049781192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:48.766335011 CEST497812090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:48.795325041 CEST497812090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:49.191963911 CEST209049781192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:52.327435970 CEST497822090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:52.612813950 CEST209049782192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:52.614249945 CEST497822090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:52.908657074 CEST497822090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:53.280567884 CEST209049782192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:56.621592999 CEST497832090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:56.887439013 CEST209049783192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:09:56.887773037 CEST497832090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:56.927326918 CEST497832090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:09:57.186721087 CEST209049783192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:10:00.264158964 CEST497842090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:10:00.516460896 CEST209049784192.169.69.25192.168.2.4
                                                      Jun 11, 2021 05:10:00.516601086 CEST497842090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:10:00.522464037 CEST497842090192.168.2.4192.169.69.25
                                                      Jun 11, 2021 05:10:00.930309057 CEST209049784192.169.69.25192.168.2.4

                                                      UDP Packets

                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jun 11, 2021 05:07:47.235093117 CEST4971453192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:07:47.297647953 CEST53497148.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:07:48.455547094 CEST5802853192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:07:48.507256985 CEST53580288.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:07:49.271984100 CEST5309753192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:07:49.332009077 CEST53530978.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:07:50.116871119 CEST4925753192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:07:50.170346975 CEST53492578.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:07:51.325320959 CEST6238953192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:07:51.377120018 CEST53623898.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:07:52.505340099 CEST4991053192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:07:52.559029102 CEST53499108.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:07:53.381258965 CEST5585453192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:07:53.434442043 CEST53558548.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:07:54.255022049 CEST6454953192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:07:54.306026936 CEST53645498.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:07:55.084492922 CEST6315353192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:07:55.135504007 CEST53631538.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:07:55.958132982 CEST5299153192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:07:56.016576052 CEST53529918.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:07:57.371150970 CEST5370053192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:07:57.421817064 CEST53537008.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:07:58.154439926 CEST5172653192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:07:58.214751959 CEST53517268.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:07:59.565663099 CEST5679453192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:07:59.619735956 CEST53567948.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:00.344687939 CEST5653453192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:00.396044970 CEST53565348.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:01.332179070 CEST5662753192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:01.393887043 CEST53566278.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:02.126149893 CEST5662153192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:02.177123070 CEST53566218.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:02.983745098 CEST6311653192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:03.033864975 CEST53631168.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:04.209381104 CEST6407853192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:04.260154963 CEST53640788.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:05.032062054 CEST6480153192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:05.082380056 CEST53648018.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:20.474477053 CEST6172153192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:20.536684036 CEST53617218.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:35.032800913 CEST5125553192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:35.186784983 CEST53512558.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:35.825135946 CEST6152253192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:35.889003038 CEST53615228.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:36.073438883 CEST5233753192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:36.144052982 CEST53523378.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:36.463407040 CEST5504653192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:36.527219057 CEST53550468.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:36.959777117 CEST4961253192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:37.140023947 CEST53496128.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:37.756829023 CEST4928553192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:37.818697929 CEST53492858.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:38.432176113 CEST5060153192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:38.496263981 CEST53506018.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:39.021497965 CEST6087553192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:39.083472013 CEST53608758.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:39.883500099 CEST5644853192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:39.937222958 CEST53564488.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:40.894696951 CEST5917253192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:40.957184076 CEST53591728.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:41.577378988 CEST6242053192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:41.641522884 CEST53624208.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:42.174377918 CEST6057953192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:42.236212969 CEST53605798.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:44.146809101 CEST5018353192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:44.197410107 CEST53501838.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:44.310956001 CEST6153153192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:44.369905949 CEST53615318.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:45.475709915 CEST4922853192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:45.538126945 CEST53492288.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:56.471431017 CEST5979453192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:56.538613081 CEST53597948.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:08:56.681895018 CEST5591653192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:08:56.750427961 CEST53559168.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:01.357621908 CEST5275253192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:01.418029070 CEST53527528.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:03.615022898 CEST6054253192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:04.626250029 CEST6054253192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:04.881957054 CEST53605428.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:08.666721106 CEST53605428.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:09.047086000 CEST6068953192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:09.306271076 CEST53606898.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:13.008507013 CEST6420653192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:13.067322016 CEST53642068.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:17.239105940 CEST5090453192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:17.300529003 CEST53509048.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:21.675340891 CEST5752553192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:21.737289906 CEST53575258.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:25.571778059 CEST5381453192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:25.632543087 CEST53538148.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:29.371440887 CEST5341853192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:29.433598042 CEST53534188.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:30.815078974 CEST6283353192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:30.882560015 CEST53628338.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:32.116275072 CEST5926053192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:32.187819004 CEST53592608.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:33.061381102 CEST4994453192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:33.114150047 CEST53499448.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:37.010565996 CEST6330053192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:37.069361925 CEST53633008.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:40.844315052 CEST6144953192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:40.906454086 CEST53614498.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:44.609051943 CEST5127553192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:44.663188934 CEST53512758.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:48.424278975 CEST6349253192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:48.488208055 CEST53634928.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:52.262861013 CEST5894553192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:52.321726084 CEST53589458.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:09:56.365417004 CEST6077953192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:09:56.619036913 CEST53607798.8.8.8192.168.2.4
                                                      Jun 11, 2021 05:10:00.210443974 CEST6401453192.168.2.48.8.8.8
                                                      Jun 11, 2021 05:10:00.262615919 CEST53640148.8.8.8192.168.2.4

                                                      ICMP Packets

                                                      TimestampSource IPDest IPChecksumCodeType
                                                      Jun 11, 2021 05:09:08.666841984 CEST192.168.2.48.8.8.8cffd(Port unreachable)Destination Unreachable

                                                      DNS Queries

                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                      Jun 11, 2021 05:09:03.615022898 CEST192.168.2.48.8.8.80x3ef9Standard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:04.626250029 CEST192.168.2.48.8.8.80x3ef9Standard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:09.047086000 CEST192.168.2.48.8.8.80xf76eStandard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:13.008507013 CEST192.168.2.48.8.8.80xe2a2Standard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:17.239105940 CEST192.168.2.48.8.8.80x3c0fStandard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:21.675340891 CEST192.168.2.48.8.8.80x7966Standard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:25.571778059 CEST192.168.2.48.8.8.80xdcb6Standard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:29.371440887 CEST192.168.2.48.8.8.80xf4dcStandard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:33.061381102 CEST192.168.2.48.8.8.80xd14eStandard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:37.010565996 CEST192.168.2.48.8.8.80xd901Standard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:40.844315052 CEST192.168.2.48.8.8.80x11fcStandard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:44.609051943 CEST192.168.2.48.8.8.80x7124Standard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:48.424278975 CEST192.168.2.48.8.8.80x7f39Standard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:52.262861013 CEST192.168.2.48.8.8.80x9c89Standard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:56.365417004 CEST192.168.2.48.8.8.80x6c8eStandard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:10:00.210443974 CEST192.168.2.48.8.8.80xdc29Standard query (0)strangerstrek.duckdns.orgA (IP address)IN (0x0001)

                                                      DNS Answers

                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                      Jun 11, 2021 05:09:04.881957054 CEST8.8.8.8192.168.2.40x3ef9No error (0)strangerstrek.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:08.666721106 CEST8.8.8.8192.168.2.40x3ef9Server failure (2)strangerstrek.duckdns.orgnonenoneA (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:09.306271076 CEST8.8.8.8192.168.2.40xf76eNo error (0)strangerstrek.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:13.067322016 CEST8.8.8.8192.168.2.40xe2a2No error (0)strangerstrek.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:17.300529003 CEST8.8.8.8192.168.2.40x3c0fNo error (0)strangerstrek.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:21.737289906 CEST8.8.8.8192.168.2.40x7966No error (0)strangerstrek.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:25.632543087 CEST8.8.8.8192.168.2.40xdcb6No error (0)strangerstrek.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:29.433598042 CEST8.8.8.8192.168.2.40xf4dcNo error (0)strangerstrek.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:33.114150047 CEST8.8.8.8192.168.2.40xd14eNo error (0)strangerstrek.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:37.069361925 CEST8.8.8.8192.168.2.40xd901No error (0)strangerstrek.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:40.906454086 CEST8.8.8.8192.168.2.40x11fcNo error (0)strangerstrek.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:44.663188934 CEST8.8.8.8192.168.2.40x7124No error (0)strangerstrek.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:48.488208055 CEST8.8.8.8192.168.2.40x7f39No error (0)strangerstrek.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:52.321726084 CEST8.8.8.8192.168.2.40x9c89No error (0)strangerstrek.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:09:56.619036913 CEST8.8.8.8192.168.2.40x6c8eNo error (0)strangerstrek.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                                                      Jun 11, 2021 05:10:00.262615919 CEST8.8.8.8192.168.2.40xdc29No error (0)strangerstrek.duckdns.org192.169.69.25A (IP address)IN (0x0001)

                                                      Code Manipulations

                                                      Statistics

                                                      Behavior

                                                      Click to jump to process

                                                      System Behavior

                                                      General

                                                      Start time:05:07:53
                                                      Start date:11/06/2021
                                                      Path:C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:'C:\Users\user\Desktop\4714D68DBB9F9AC36425F2EC73ED434CF57407F36063C.exe'
                                                      Imagebase:0x3d0000
                                                      File size:676608 bytes
                                                      MD5 hash:4DF9B2C6531CDE226BF1B0AE86D41162
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.681356331.0000000003C47000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000002.681356331.0000000003C47000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000002.681356331.0000000003C47000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.680120099.0000000002A61000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000002.680120099.0000000002A61000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000002.680120099.0000000002A61000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      Reputation:low

                                                      General

                                                      Start time:05:07:55
                                                      Start date:11/06/2021
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                      Imagebase:0x7ff6eb840000
                                                      File size:51288 bytes
                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      General

                                                      Start time:05:08:13
                                                      Start date:11/06/2021
                                                      Path:C:\Windows\SysWOW64\explorer.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:'C:\Windows\System32\explorer.exe' /c select, C:\Users\user\Music\fullview.exe
                                                      Imagebase:0x3b0000
                                                      File size:3611360 bytes
                                                      MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      General

                                                      Start time:05:08:15
                                                      Start date:11/06/2021
                                                      Path:C:\Windows\explorer.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                      Imagebase:0x7ff6fee60000
                                                      File size:3933184 bytes
                                                      MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      General

                                                      Start time:05:08:16
                                                      Start date:11/06/2021
                                                      Path:C:\Users\user\Music\fullview.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:'C:\Users\user\Music\fullview.exe'
                                                      Imagebase:0x740000
                                                      File size:676608 bytes
                                                      MD5 hash:4DF9B2C6531CDE226BF1B0AE86D41162
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000004.00000002.756321021.000000000320B000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 00000004.00000002.756321021.000000000320B000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 00000004.00000002.756321021.000000000320B000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000004.00000002.756794475.0000000003FB7000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 00000004.00000002.756794475.0000000003FB7000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 00000004.00000002.756794475.0000000003FB7000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000004.00000002.755773699.0000000002DD1000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 00000004.00000002.755773699.0000000002DD1000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 00000004.00000002.755773699.0000000002DD1000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      Antivirus matches:
                                                      • Detection: 100%, Avira
                                                      • Detection: 100%, Joe Sandbox ML
                                                      • Detection: 79%, ReversingLabs
                                                      Reputation:low

                                                      General

                                                      Start time:05:08:20
                                                      Start date:11/06/2021
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                      Imagebase:0x7ff6eb840000
                                                      File size:51288 bytes
                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      General

                                                      Start time:05:08:27
                                                      Start date:11/06/2021
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                      Imagebase:0x7ff6eb840000
                                                      File size:51288 bytes
                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      General

                                                      Start time:05:08:33
                                                      Start date:11/06/2021
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                      Imagebase:0x7ff6eb840000
                                                      File size:51288 bytes
                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      General

                                                      Start time:05:08:35
                                                      Start date:11/06/2021
                                                      Path:C:\Users\user\Music\fullview.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\Music\fullview.exe
                                                      Imagebase:0xdc0000
                                                      File size:676608 bytes
                                                      MD5 hash:4DF9B2C6531CDE226BF1B0AE86D41162
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000B.00000000.736589256.0000000000402000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000B.00000002.900690082.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 0000000B.00000002.900690082.0000000000402000.00000040.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000B.00000002.900690082.0000000000402000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      Reputation:low

                                                      General

                                                      Start time:05:08:43
                                                      Start date:11/06/2021
                                                      Path:C:\Users\user\Music\fullview.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:'C:\Users\user\Music\fullview.exe' -boot
                                                      Imagebase:0xd30000
                                                      File size:676608 bytes
                                                      MD5 hash:4DF9B2C6531CDE226BF1B0AE86D41162
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000C.00000002.817394894.00000000046A7000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 0000000C.00000002.817394894.00000000046A7000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000C.00000002.817394894.00000000046A7000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000C.00000002.813989539.00000000034C1000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 0000000C.00000002.813989539.00000000034C1000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000C.00000002.813989539.00000000034C1000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      Reputation:low

                                                      General

                                                      Start time:05:08:51
                                                      Start date:11/06/2021
                                                      Path:C:\Users\user\Music\fullview.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:'C:\Users\user\Music\fullview.exe' -boot
                                                      Imagebase:0x7ff69f0d0000
                                                      File size:676608 bytes
                                                      MD5 hash:4DF9B2C6531CDE226BF1B0AE86D41162
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000D.00000002.830327224.0000000003DE7000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 0000000D.00000002.830327224.0000000003DE7000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000D.00000002.830327224.0000000003DE7000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000D.00000002.829183550.0000000002E26000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 0000000D.00000002.829183550.0000000002E26000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000D.00000002.829183550.0000000002E26000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000D.00000002.828936006.0000000002C18000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 0000000D.00000002.828936006.0000000002C18000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000D.00000002.828936006.0000000002C18000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      Reputation:low

                                                      General

                                                      Start time:05:09:03
                                                      Start date:11/06/2021
                                                      Path:C:\Users\user\Music\fullview.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\Music\fullview.exe
                                                      Imagebase:0xd40000
                                                      File size:676608 bytes
                                                      MD5 hash:4DF9B2C6531CDE226BF1B0AE86D41162
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000010.00000002.821203720.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 00000010.00000002.821203720.0000000000402000.00000040.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 00000010.00000002.821203720.0000000000402000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000010.00000000.796452577.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 00000010.00000000.796452577.0000000000402000.00000040.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 00000010.00000000.796452577.0000000000402000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      Reputation:low

                                                      General

                                                      Start time:05:09:10
                                                      Start date:11/06/2021
                                                      Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe'
                                                      Imagebase:0x980000
                                                      File size:676608 bytes
                                                      MD5 hash:4DF9B2C6531CDE226BF1B0AE86D41162
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000011.00000002.829265628.0000000003691000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 00000011.00000002.829265628.0000000003691000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 00000011.00000002.829265628.0000000003691000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000011.00000002.831852482.0000000004877000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 00000011.00000002.831852482.0000000004877000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 00000011.00000002.831852482.0000000004877000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      Antivirus matches:
                                                      • Detection: 100%, Avira
                                                      • Detection: 100%, Joe Sandbox ML
                                                      • Detection: 79%, ReversingLabs
                                                      Reputation:low

                                                      General

                                                      Start time:05:09:10
                                                      Start date:11/06/2021
                                                      Path:C:\Users\user\Music\fullview.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\Music\fullview.exe
                                                      Imagebase:0xd30000
                                                      File size:676608 bytes
                                                      MD5 hash:4DF9B2C6531CDE226BF1B0AE86D41162
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 00000012.00000000.811837590.0000000000402000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000012.00000002.837153151.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                      • Rule: njrat1, Description: Identify njRat, Source: 00000012.00000002.837153151.0000000000402000.00000040.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: Njrat, Description: detect njRAT in memory, Source: 00000012.00000002.837153151.0000000000402000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                      Reputation:low

                                                      Disassembly

                                                      Code Analysis

                                                      Reset < >