Loading ...

Play interactive tourEdit tour

Analysis Report Invoice#06-11-2021_PDF.vbs

Overview

General Information

Sample Name:Invoice#06-11-2021_PDF.vbs
Analysis ID:433519
MD5:fcc6014f7ee0539aead5f38b4fe5245e
SHA1:2f006d44ad82ca71319a5bf615677016ff7e918b
SHA256:699d670809bccdbbdb2ae85d80be86d6fd00586c56e0375df34527d4ec6045cf
Tags:NanoCoreRATvbs
Infos:

Most interesting Screenshot:

Detection

Nanocore AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
VBScript performs obfuscated calls to suspicious functions
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code contains very large strings
C2 URLs / IPs found in malware configuration
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Tries to load missing DLLs
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

Process Tree

  • System is w10x64
  • wscript.exe (PID: 4804 cmdline: C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Invoice#06-11-2021_PDF.vbs' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
    • file1.exe (PID: 5784 cmdline: 'C:\Users\user\AppData\Local\Temp\file1.exe' MD5: 07C82C84BAEC92953A270419C72D7F10)
      • schtasks.exe (PID: 5412 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\HHyKJahmIz' /XML 'C:\Users\user\AppData\Local\Temp\tmpC46.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • file1.exe (PID: 4076 cmdline: {path} MD5: 07C82C84BAEC92953A270419C72D7F10)
    • 2name.exe (PID: 5828 cmdline: 'C:\Users\user\AppData\Local\Temp\2name.exe' MD5: CF4CD927CCC626FB016D0E91CF6BD456)
      • 2name.exe (PID: 5004 cmdline: {path} MD5: CF4CD927CCC626FB016D0E91CF6BD456)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "c687c38e-2b2d-4d96-b5eb-9a31ccba", "Group": "Sys", "Domain1": "sys2021.linkpc.net", "Domain2": "", "Port": 11940, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "result@jetport-aero.comNiniola@456mail.jetport-aero.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000015.00000002.479174515.0000000004334000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000015.00000000.291952352.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000015.00000000.291952352.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000015.00000000.291952352.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfcf5:$a: NanoCore
      • 0xfd05:$a: NanoCore
      • 0xff39:$a: NanoCore
      • 0xff4d:$a: NanoCore
      • 0xff8d:$a: NanoCore
      • 0xfd54:$b: ClientPlugin
      • 0xff56:$b: ClientPlugin
      • 0xff96:$b: ClientPlugin
      • 0xfe7b:$c: ProjectData
      • 0x10882:$d: DESCrypto
      • 0x1824e:$e: KeepAlive
      • 0x1623c:$g: LogClientMessage
      • 0x12437:$i: get_Connected
      • 0x10bb8:$j: #=q
      • 0x10be8:$j: #=q
      • 0x10c04:$j: #=q
      • 0x10c34:$j: #=q
      • 0x10c50:$j: #=q
      • 0x10c6c:$j: #=q
      • 0x10c9c:$j: #=q
      • 0x10cb8:$j: #=q
      00000015.00000002.468642288.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xff8d:$x1: NanoCore.ClientPluginHost
      • 0xffca:$x2: IClientNetworkHost
      • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 37 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      21.2.file1.exe.4346f00.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xf7ad:$x1: NanoCore.ClientPluginHost
      • 0xf7da:$x2: IClientNetworkHost
      21.2.file1.exe.4346f00.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xf7ad:$x2: NanoCore.ClientPluginHost
      • 0x10888:$s4: PipeCreated
      • 0xf7c7:$s5: IClientLoggingHost
      21.2.file1.exe.4346f00.5.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        21.2.file1.exe.5680000.7.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        21.2.file1.exe.5680000.7.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        Click to see the 48 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\file1.exe, ProcessId: 4076, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\file1.exe, ProcessId: 4076, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\file1.exe, ProcessId: 4076, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\file1.exe, ProcessId: 4076, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000015.00000002.479174515.0000000004334000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "c687c38e-2b2d-4d96-b5eb-9a31ccba", "Group": "Sys", "Domain1": "sys2021.linkpc.net", "Domain2": "", "Port": 11940, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Source: 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmpMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "result@jetport-aero.comNiniola@456mail.jetport-aero.com"}
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000015.00000002.479174515.0000000004334000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.291952352.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.468642288.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.297937965.0000000003F51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.307230936.000000000D351000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.292645242.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.480599769.0000000005C00000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: file1.exe PID: 4076, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: file1.exe PID: 5784, type: MEMORY
        Source: Yara matchFile source: 21.2.file1.exe.4346f00.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.file1.exe.d3e8eb8.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.4346f00.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.file1.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.434b529.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.file1.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.5c00000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.5c04629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.file1.exe.d3e8eb8.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.file1.exe.3fbb588.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.5c00000.11.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\HHyKJahmIz.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\file1.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\2name.exeJoe Sandbox ML: detected
        Source: 21.2.file1.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 21.2.file1.exe.4346f00.5.unpackAvira: Label: TR/NanoCore.fadte
        Source: 21.0.file1.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 21.0.file1.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 16.2.2name.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
        Source: 21.2.file1.exe.5c00000.11.unpackAvira: Label: TR/NanoCore.fadte
        Source: 16.0.2name.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
        Source: C:\Users\user\AppData\Local\Temp\file1.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\fHUHYTcyNn\src\obj\Debug\Fojl.pdb source: file1.exe, HHyKJahmIz.exe.1.dr
        Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\BgZPfvXhjX\src\obj\Debug\ybwg.pdb source: 2name.exe, 2name.exe.0.dr
        Source: Binary string: mscorrc.pdb source: file1.exe, 00000001.00000002.306351221.0000000007090000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.301515455.0000000006520000.00000002.00000001.sdmp, 2name.exe, 00000010.00000002.481913869.0000000006450000.00000002.00000001.sdmp, file1.exe, 00000015.00000002.480073860.00000000057B0000.00000002.00000001.sdmp

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49731 -> 191.96.25.26:11940
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49735 -> 191.96.25.26:11940
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49742 -> 191.96.25.26:11940
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49743 -> 191.96.25.26:11940
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49747 -> 191.96.25.26:11940
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs:
        Source: Malware configuration extractorURLs: sys2021.linkpc.net
        Source: global trafficTCP traffic: 192.168.2.3:49723 -> 52.39.28.134:11940
        Source: global trafficTCP traffic: 192.168.2.3:49731 -> 191.96.25.26:11940
        Source: global trafficTCP traffic: 192.168.2.3:49736 -> 217.182.175.206:587
        Source: Joe Sandbox ViewIP Address: 191.96.25.26 191.96.25.26
        Source: Joe Sandbox ViewIP Address: 217.182.175.206 217.182.175.206
        Source: Joe Sandbox ViewASN Name: AS40676US AS40676US
        Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
        Source: global trafficTCP traffic: 192.168.2.3:49736 -> 217.182.175.206:587
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: unknownTCP traffic detected without corresponding DNS query: 191.96.25.26
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_055E2936 WSARecv,
        Source: unknownDNS traffic detected: queries for: clientconfig.passport.net
        Source: 2name.exe, 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
        Source: 2name.exe, 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
        Source: 2name.exe, 00000010.00000002.482353717.00000000075D0000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
        Source: 2name.exe, 00000010.00000002.482353717.00000000075D0000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
        Source: 2name.exe, 00000010.00000002.482353717.00000000075D0000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
        Source: 2name.exe, 00000010.00000002.482353717.00000000075D0000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
        Source: file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, file1.exe, 00000001.00000003.208580143.00000000052BB000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.298084668.0000000004E70000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: 2name.exe, 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmpString found in binary or memory: http://gKSfZA.com
        Source: 2name.exe, 00000010.00000002.482353717.00000000075D0000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0/
        Source: 2name.exe, 00000010.00000002.482412718.000000000760F000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0m
        Source: 2name.exe, 00000010.00000002.482353717.00000000075D0000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
        Source: 2name.exe, 00000002.00000003.215138787.0000000004D1E000.00000004.00000001.sdmpString found in binary or memory: http://www.agfamonotype.
        Source: file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.298084668.0000000004E70000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: 2name.exe, 00000002.00000003.210776108.0000000000D3D000.00000004.00000001.sdmp, 2name.exe, 00000002.00000003.211318733.0000000004D03000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: 2name.exe, 00000002.00000003.211273379.0000000004D0D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comC
        Source: file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: 2name.exe, 00000002.00000003.210776108.0000000000D3D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comn-u
        Source: file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: file1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: file1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: 2name.exe, 00000002.00000003.212658288.0000000004D15000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frer
        Source: file1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: file1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: file1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: file1.exe, 00000001.00000002.294083787.0000000001147000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comgrito
        Source: 2name.exe, 00000002.00000002.297889020.0000000004D00000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comionu
        Source: file1.exe, 00000001.00000003.208338149.00000000052BB000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.298084668.0000000004E70000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: file1.exe, 00000001.00000003.208338149.00000000052BB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com8
        Source: file1.exe, 00000001.00000003.208373034.00000000052BB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comc
        Source: file1.exe, 00000001.00000003.208338149.00000000052BB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comic
        Source: file1.exe, 00000001.00000003.208338149.00000000052BB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comn
        Source: file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: file1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.298084668.0000000004E70000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: file1.exe, 00000001.00000003.209781217.00000000052A4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnk
        Source: file1.exe, 00000001.00000003.213306168.00000000052DD000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
        Source: file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: file1.exe, 00000001.00000003.213306168.00000000052DD000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/c
        Source: file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, file1.exe, 00000001.00000003.213754536.00000000052A4000.00000004.00000001.sdmp, 2name.exe, 00000002.00000003.214409435.0000000004D19000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: file1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: 2name.exe, 00000002.00000003.211507950.0000000004D03000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/A
        Source: 2name.exe, 00000002.00000003.211507950.0000000004D03000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/X
        Source: 2name.exe, 00000002.00000003.211507950.0000000004D03000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: 2name.exe, 00000002.00000003.211318733.0000000004D03000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/r
        Source: 2name.exe, 00000002.00000003.211507950.0000000004D03000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/s
        Source: 2name.exe, 00000002.00000003.214932192.0000000004D0E000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.
        Source: file1.exe, 00000001.00000003.208338149.00000000052BB000.00000004.00000001.sdmp, file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.298084668.0000000004E70000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: file1.exe, 00000001.00000003.208338149.00000000052BB000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com4
        Source: file1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000003.211690154.0000000004D17000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.298084668.0000000004E70000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: file1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: file1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: 2name.exe, 00000010.00000002.482353717.00000000075D0000.00000004.00000001.sdmpString found in binary or memory: http://x1.c.lencr.org/0
        Source: 2name.exe, 00000010.00000002.482412718.000000000760F000.00000004.00000001.sdmpString found in binary or memory: http://x1.i.len
        Source: 2name.exe, 00000010.00000002.482353717.00000000075D0000.00000004.00000001.sdmpString found in binary or memory: http://x1.i.lencr.org/0
        Source: 2name.exe, 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%(
        Source: 2name.exe, 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
        Source: 2name.exe, 00000010.00000002.478136134.00000000033C3000.00000004.00000001.sdmpString found in binary or memory: https://w5tNnUBgMNAftBN.net
        Source: 2name.exe, 00000002.00000002.311010210.000000000CDE1000.00000004.00000001.sdmp, 2name.exe, 00000010.00000002.468518858.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
        Source: 2name.exe, 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
        Source: file1.exe, 00000001.00000002.293733593.0000000000E99000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: C:\Users\user\AppData\Local\Temp\2name.exeWindow created: window name: CLIPBRDWNDCLASS
        Source: file1.exe, 00000015.00000002.479174515.0000000004334000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000015.00000002.479174515.0000000004334000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.291952352.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.468642288.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.297937965.0000000003F51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.307230936.000000000D351000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.292645242.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.480599769.0000000005C00000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: file1.exe PID: 4076, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: file1.exe PID: 5784, type: MEMORY
        Source: Yara matchFile source: 21.2.file1.exe.4346f00.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.file1.exe.d3e8eb8.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.4346f00.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.file1.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.434b529.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.file1.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.5c00000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.5c04629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.file1.exe.d3e8eb8.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.file1.exe.3fbb588.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.5c00000.11.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000015.00000000.291952352.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000015.00000000.291952352.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000002.468642288.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000015.00000002.468642288.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000002.479905732.0000000005680000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000002.297937965.0000000003F51000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000002.297937965.0000000003F51000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.307230936.000000000D351000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000002.307230936.000000000D351000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000000.292645242.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000015.00000000.292645242.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000002.480599769.0000000005C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: file1.exe PID: 4076, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: file1.exe PID: 4076, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: file1.exe PID: 5784, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: file1.exe PID: 5784, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.2.file1.exe.4346f00.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.file1.exe.5680000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.file1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.file1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.file1.exe.d3e8eb8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.file1.exe.d3e8eb8.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.2.file1.exe.4346f00.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.0.file1.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.0.file1.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.2.file1.exe.434b529.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.0.file1.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.0.file1.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.2.file1.exe.32f12e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.file1.exe.5c00000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.file1.exe.5c04629.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.file1.exe.d3e8eb8.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.file1.exe.d3e8eb8.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.file1.exe.3fbb588.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.file1.exe.3fbb588.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.2.file1.exe.5c00000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        .NET source code contains very large array initializationsShow sources
        Source: 16.2.2name.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bCC1C2456u002d206Cu002d47B2u002dB640u002d7A9D0A18E16Bu007d/B899F0BCu002d2DBBu002d4D46u002dA39Eu002dC38AFE9A69B6.csLarge array initialization: .cctor: array initializer size 12097
        Source: 16.0.2name.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007bCC1C2456u002d206Cu002d47B2u002dB640u002d7A9D0A18E16Bu007d/B899F0BCu002d2DBBu002d4D46u002dA39Eu002dC38AFE9A69B6.csLarge array initialization: .cctor: array initializer size 12097
        .NET source code contains very large stringsShow sources
        Source: file1.exe.0.dr, Util/Form1.csLong String: Length: 11840
        Source: HHyKJahmIz.exe.1.dr, Util/Form1.csLong String: Length: 11840
        Source: 1.0.file1.exe.5d0000.0.unpack, Util/Form1.csLong String: Length: 11840
        Source: 1.2.file1.exe.5d0000.0.unpack, Util/Form1.csLong String: Length: 11840
        Source: 2.0.2name.exe.190000.0.unpack, Util/Form1.csLong String: Length: 11840
        Source: 2.2.2name.exe.190000.0.unpack, Util/Form1.csLong String: Length: 11840
        Source: 16.0.2name.exe.a30000.2.unpack, Util/Form1.csLong String: Length: 11840
        Source: 16.2.2name.exe.a30000.1.unpack, Util/Form1.csLong String: Length: 11840
        Source: 16.0.2name.exe.a30000.0.unpack, Util/Form1.csLong String: Length: 11840
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_05153A6A NtQuerySystemInformation,
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_05153A39 NtQuerySystemInformation,
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_04BD27EE NtQuerySystemInformation,
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_04BD27B4 NtQuerySystemInformation,
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_055E116A NtQuerySystemInformation,
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_055E112F NtQuerySystemInformation,
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_010C2E09
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02A95420
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02A945A0
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02A94EF9
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02A91F08
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02A91F18
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02A92CE8
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02A92CF8
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02A95411
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02A9458F
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02AD22C2
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B47EF9
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B44EC8
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B46C00
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4ED80
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B487E8
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B467C0
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4D130
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B47720
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B40128
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4C967
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B46148
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B476A6
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B476FE
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4C84E
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4D848
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4C649
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4DDAF
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4AD90
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4D591
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4B780
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4C78E
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4AD8A
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4DDE0
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4B530
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B46138
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4B320
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4B528
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4B311
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B40118
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B48309
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4B970
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4ED72
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02B4B77A
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_005D2050
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241D640
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02416C10
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02414ED8
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_024176E8
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241DAB8
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02416148
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02418710
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_024167D0
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02417DE0
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_024195A0
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02417650
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02416C08
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241CE10
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241C81E
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02418220
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02418230
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241D630
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241B8C0
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241B4C0
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02414EC8
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241B2C8
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241B4D0
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241B2D8
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241DAA8
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_024194B0
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241B8BF
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02418700
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02410118
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241B718
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241B720
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241AD20
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241AD30
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02416138
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241A338
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02417DD1
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_0241CDDC
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_04901E30
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_04900070
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_04903A97
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_049026B0
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_049026C0
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_04901E21
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_04903C70
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_04903C6F
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_049041D0
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_049041C1
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_00192050
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02411E9D
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 16_2_015F0CB0
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 16_2_00A32050
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_054CAD38
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_054C8468
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_054C9068
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_054C2FA8
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_054C23A0
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_054C9910
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_054C912F
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_054C306F
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_00C42050
        Source: Invoice#06-11-2021_PDF.vbsInitial sample: Strings found which are bigger than 50
        Source: C:\Users\user\AppData\Local\Temp\2name.exeSection loaded: security.dll
        Source: 00000015.00000000.291952352.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000015.00000000.291952352.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000002.468642288.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000015.00000002.468642288.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000002.479905732.0000000005680000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000015.00000002.479905732.0000000005680000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000001.00000002.297937965.0000000003F51000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.297937965.0000000003F51000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.307230936.000000000D351000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.307230936.000000000D351000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000000.292645242.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000015.00000000.292645242.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000002.480599769.0000000005C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000015.00000002.480599769.0000000005C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: Process Memory Space: file1.exe PID: 4076, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: file1.exe PID: 4076, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: file1.exe PID: 5784, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: file1.exe PID: 5784, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.2.file1.exe.4346f00.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.file1.exe.4346f00.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.2.file1.exe.5680000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.file1.exe.5680000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.2.file1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.file1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.2.file1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.file1.exe.d3e8eb8.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.file1.exe.d3e8eb8.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.file1.exe.d3e8eb8.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.2.file1.exe.4346f00.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.file1.exe.4346f00.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.0.file1.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.0.file1.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.0.file1.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.2.file1.exe.434b529.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.file1.exe.434b529.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.0.file1.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.0.file1.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.0.file1.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.2.file1.exe.32f12e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.file1.exe.32f12e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.2.file1.exe.5c00000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.file1.exe.5c00000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.2.file1.exe.5c04629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.file1.exe.5c04629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.file1.exe.d3e8eb8.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.file1.exe.d3e8eb8.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.file1.exe.d3e8eb8.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.file1.exe.3fbb588.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.file1.exe.3fbb588.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.2.file1.exe.5c00000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.file1.exe.5c00000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: file1.exe.0.dr, Util/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: HHyKJahmIz.exe.1.dr, Util/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 1.0.file1.exe.5d0000.0.unpack, Util/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 1.2.file1.exe.5d0000.0.unpack, Util/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 2.0.2name.exe.190000.0.unpack, Util/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 2.2.2name.exe.190000.0.unpack, Util/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: classification engineClassification label: mal100.troj.evad.winVBS@12/8@5/3
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_051534BA AdjustTokenPrivileges,
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_05153483 AdjustTokenPrivileges,
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_04BD271E AdjustTokenPrivileges,
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_04BD26E7 AdjustTokenPrivileges,
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_055E0F2A AdjustTokenPrivileges,
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_055E0EF3 AdjustTokenPrivileges,
        Source: C:\Users\user\AppData\Local\Temp\file1.exeFile created: C:\Users\user\AppData\Roaming\HHyKJahmIz.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\2name.exeMutant created: \Sessions\1\BaseNamedObjects\QUEliPPQLXYqEIejkDjxjhpJy
        Source: C:\Users\user\AppData\Local\Temp\file1.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5076:120:WilError_01
        Source: C:\Users\user\AppData\Local\Temp\file1.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{c687c38e-2b2d-4d96-b5eb-9a31ccba603d}
        Source: C:\Users\user\AppData\Local\Temp\file1.exeMutant created: \Sessions\1\BaseNamedObjects\XwcfCsvtCuqlwxDKlK
        Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\file1.exeJump to behavior
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Invoice#06-11-2021_PDF.vbs'
        Source: C:\Users\user\AppData\Local\Temp\file1.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\file1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\AppData\Local\Temp\file1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\AppData\Local\Temp\2name.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\2name.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\AppData\Local\Temp\2name.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\AppData\Local\Temp\2name.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\2name.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\AppData\Local\Temp\2name.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\AppData\Local\Temp\file1.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\file1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\AppData\Local\Temp\file1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\AppData\Local\Temp\2name.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\AppData\Local\Temp\2name.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Users\user\AppData\Local\Temp\2name.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\2name.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Invoice#06-11-2021_PDF.vbs'
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\file1.exe 'C:\Users\user\AppData\Local\Temp\file1.exe'
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\2name.exe 'C:\Users\user\AppData\Local\Temp\2name.exe'
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess created: C:\Users\user\AppData\Local\Temp\2name.exe {path}
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\HHyKJahmIz' /XML 'C:\Users\user\AppData\Local\Temp\tmpC46.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess created: C:\Users\user\AppData\Local\Temp\file1.exe {path}
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\file1.exe 'C:\Users\user\AppData\Local\Temp\file1.exe'
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\2name.exe 'C:\Users\user\AppData\Local\Temp\2name.exe'
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\HHyKJahmIz' /XML 'C:\Users\user\AppData\Local\Temp\tmpC46.tmp'
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess created: C:\Users\user\AppData\Local\Temp\file1.exe {path}
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess created: C:\Users\user\AppData\Local\Temp\2name.exe {path}
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32
        Source: C:\Users\user\AppData\Local\Temp\file1.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: Invoice#06-11-2021_PDF.vbsStatic file information: File size 2064477 > 1048576
        Source: C:\Users\user\AppData\Local\Temp\file1.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\fHUHYTcyNn\src\obj\Debug\Fojl.pdb source: file1.exe, HHyKJahmIz.exe.1.dr
        Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\BgZPfvXhjX\src\obj\Debug\ybwg.pdb source: 2name.exe, 2name.exe.0.dr
        Source: Binary string: mscorrc.pdb source: file1.exe, 00000001.00000002.306351221.0000000007090000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.301515455.0000000006520000.00000002.00000001.sdmp, 2name.exe, 00000010.00000002.481913869.0000000006450000.00000002.00000001.sdmp, file1.exe, 00000015.00000002.480073860.00000000057B0000.00000002.00000001.sdmp

        Data Obfuscation:

        barindex
        VBScript performs obfuscated calls to suspicious functionsShow sources
        Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("C:\Users\user\AppData\Local\Temp\file1.exe");IFileSystem3.GetSpecialFolder("2");IFolder.Path();IFileSystem3.GetSpecialFolder("2");IFolder.Path();IXMLDOMNode._00000029("tmp");IXMLDOMElement.dataType("bin.base64");IXMLDOMElement.text("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAG0PvmAAAAAAAAAAAOAAAgELATAAAIALAAAIAAAAAAAA6p4");IXMLDOMElement.nodeTypedValue();_Stream.Type("1");_Stream.Open();_Stream.Write("Unsupported parameter type 00002011");_Stream.SaveToFile("C:\Users\user\AppData\Local\Temp\file1.exe", "2");IXMLDOMNode._00000029("tmp");IXMLDOMElement.dataType("bin.base64");IXMLDOMElement.text("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAOUQvmAAAAAAAAAAAOAAAgELATAAAAoLAAAIAAAAAAAAwig");IXMLDOMElement.nodeTypedValue();_Stream.Type("1");_Stream.Open();_Stream.Write("Unsupported parameter type 00002011");_Stream.SaveToFile("C:\Users\user\AppData\Local\Temp\2name.exe", "2");IWshShell3.Run("C:\Users\user\AppData\Local\Temp\file1.exe");IWshShell3.Run("C:\Users\user\AppData\Local\Temp\2name.exe")
        .NET source code contains method to dynamically call methods (often used by packers)Show sources
        Source: file1.exe.0.dr, Util/Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: HHyKJahmIz.exe.1.dr, Util/Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 1.0.file1.exe.5d0000.0.unpack, Util/Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 1.2.file1.exe.5d0000.0.unpack, Util/Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 2.0.2name.exe.190000.0.unpack, Util/Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 2.2.2name.exe.190000.0.unpack, Util/Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 16.0.2name.exe.a30000.2.unpack, Util/Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 16.2.2name.exe.a30000.1.unpack, Util/Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 16.0.2name.exe.a30000.0.unpack, Util/Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        .NET source code contains potential unpackerShow sources
        Source: file1.exe.0.dr, Util/Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: HHyKJahmIz.exe.1.dr, Util/Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.file1.exe.5d0000.0.unpack, Util/Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.2.file1.exe.5d0000.0.unpack, Util/Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 2.0.2name.exe.190000.0.unpack, Util/Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 2.2.2name.exe.190000.0.unpack, Util/Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 16.0.2name.exe.a30000.2.unpack, Util/Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 16.2.2name.exe.a30000.1.unpack, Util/Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 16.0.2name.exe.a30000.0.unpack, Util/Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_010C7ACB push 5C010C7Eh; ret
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02A312A2 push esp; iretd
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_02A93B49 pushad ; retf
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 2_2_02418AAE push esi; iretd
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 16_2_05CD41E8 push cs; retf
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 16_2_05CD4175 push cs; retf
        Source: C:\Users\user\AppData\Local\Temp\2name.exeCode function: 16_2_05CD425C push cs; retf
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_015EABD8 push cs; retf
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_015EAAEF push cs; retf
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_015EAB63 push cs; retf
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_015E9D30 pushad ; retf
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_015E9D2C push eax; retf
        Source: initial sampleStatic PE information: section name: .text entropy: 7.50207459163
        Source: initial sampleStatic PE information: section name: .text entropy: 7.50207459163
        Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\file1.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\file1.exeFile created: C:\Users\user\AppData\Roaming\HHyKJahmIz.exeJump to dropped file
        Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\2name.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\HHyKJahmIz' /XML 'C:\Users\user\AppData\Local\Temp\tmpC46.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\AppData\Local\Temp\file1.exeFile opened: C:\Users\user\AppData\Local\Temp\file1.exe:Zone.Identifier read attributes | delete
        Source: C:\Windows\System32\wscript.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: Process Memory Space: file1.exe PID: 5784, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 2name.exe PID: 5828, type: MEMORY
        Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
        Source: C:\Users\user\AppData\Local\Temp\2name.exeFunction Chain: threadDelayed,memAlloc,systemQueried,systemQueried,threadCreated,threadResumed,threadDelayed,threadDelayed,threadDelayed,systemQueried,systemQueried,systemQueried,systemQueried,threadDelayed,threadDelayed,threadAPCQueued,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed,threadDelayed,processSet,processSet,memAlloc
        Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
        Source: C:\Users\user\AppData\Local\Temp\2name.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
        Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
        Source: C:\Users\user\AppData\Local\Temp\2name.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
        Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)Show sources
        Source: C:\Users\user\AppData\Local\Temp\file1.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
        Source: C:\Users\user\AppData\Local\Temp\2name.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: file1.exe, 00000001.00000002.295261844.0000000002F51000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.293211794.00000000028B1000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: file1.exe, 00000001.00000002.295499001.0000000002FA5000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.293280762.0000000002905000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\AppData\Local\Temp\2name.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier
        Source: C:\Users\user\AppData\Local\Temp\2name.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
        Source: C:\Users\user\AppData\Local\Temp\2name.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
        Source: C:\Users\user\AppData\Local\Temp\file1.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\AppData\Local\Temp\2name.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum name: 0
        Source: C:\Users\user\AppData\Local\Temp\2name.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
        Source: C:\Users\user\AppData\Local\Temp\file1.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\2name.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\file1.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
        Source: C:\Users\user\AppData\Local\Temp\2name.exeWindow / User API: threadDelayed 358
        Source: C:\Users\user\AppData\Local\Temp\file1.exeWindow / User API: threadDelayed 358
        Source: C:\Users\user\AppData\Local\Temp\file1.exeWindow / User API: foregroundWindowGot 696
        Source: C:\Users\user\AppData\Local\Temp\file1.exe TID: 5812Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\2name.exe TID: 5272Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\2name.exe TID: 5272Thread sleep count: 358 > 30
        Source: C:\Users\user\AppData\Local\Temp\2name.exe TID: 5272Thread sleep time: -10740000s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\2name.exe TID: 5272Thread sleep time: -30000s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\2name.exe TID: 4620Thread sleep count: 114 > 30
        Source: C:\Users\user\AppData\Local\Temp\2name.exe TID: 5272Thread sleep time: -30000s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\file1.exe TID: 1872Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\file1.exe TID: 1872Thread sleep count: 97 > 30
        Source: C:\Users\user\AppData\Local\Temp\file1.exe TID: 1872Thread sleep count: 180 > 30
        Source: C:\Users\user\AppData\Local\Temp\file1.exe TID: 1632Thread sleep count: 358 > 30
        Source: C:\Users\user\AppData\Local\Temp\file1.exe TID: 4144Thread sleep time: -120000s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\2name.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\AppData\Local\Temp\2name.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Users\user\AppData\Local\Temp\2name.exeLast function: Thread delayed
        Source: C:\Users\user\AppData\Local\Temp\2name.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_055E0BB6 GetSystemInfo,
        Source: C:\Users\user\AppData\Local\Temp\file1.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\2name.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\2name.exeThread delayed: delay time: 30000
        Source: C:\Users\user\AppData\Local\Temp\2name.exeThread delayed: delay time: 30000
        Source: C:\Users\user\AppData\Local\Temp\2name.exeThread delayed: delay time: 30000
        Source: C:\Users\user\AppData\Local\Temp\file1.exeThread delayed: delay time: 922337203685477
        Source: 2name.exe, 00000002.00000002.291497957.0000000000932000.00000004.00000020.sdmpBinary or memory string: VMware
        Source: 2name.exe, 00000002.00000002.293211794.00000000028B1000.00000004.00000001.sdmpBinary or memory string: kr#"SOFTWARE\VMware, Inc.\VMware Tools
        Source: wscript.exe, 00000000.00000002.211623017.0000019EB28A0000.00000002.00000001.sdmp, 2name.exe, 00000010.00000002.480786850.0000000005A40000.00000002.00000001.sdmp, file1.exe, 00000015.00000002.472979252.0000000001390000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: 2name.exe, 00000002.00000002.293211794.00000000028B1000.00000004.00000001.sdmpBinary or memory string: krA"SOFTWARE\VMware, Inc.\VMware Tools
        Source: 2name.exe, 00000002.00000002.293211794.00000000028B1000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: file1.exe, 00000001.00000002.293875714.0000000000F40000.00000004.00000020.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}j
        Source: 2name.exe, 00000002.00000002.293280762.0000000002905000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: 2name.exe, 00000002.00000002.293211794.00000000028B1000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: wscript.exe, 00000000.00000002.211623017.0000019EB28A0000.00000002.00000001.sdmp, 2name.exe, 00000010.00000002.480786850.0000000005A40000.00000002.00000001.sdmp, file1.exe, 00000015.00000002.472979252.0000000001390000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: 2name.exe, 00000002.00000002.293211794.00000000028B1000.00000004.00000001.sdmpBinary or memory string: kr#"SOFTWARE\VMware, Inc.\VMware T
        Source: 2name.exe, 00000002.00000002.293211794.00000000028B1000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: 2name.exe, 00000002.00000002.293280762.0000000002905000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: 2name.exe, 00000002.00000002.293211794.00000000028B1000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: 2name.exe, 00000010.00000002.472619291.000000000120A000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: wscript.exe, 00000000.00000003.199257789.0000019EB0190000.00000004.00000001.sdmp, Invoice#06-11-2021_PDF.vbsBinary or memory string: 'PywLQqLQJgRpHhwTuIPzMzmJNdILTuqemuOCGvnLgvycNPhSeUypXFXPLnymiAxOqnCMStMzUESRBKvxvpgywAGhXzqTxBcgxkmaNUAkIyUTmFOBsAqsTySpgVpSDtCTbmTRYVkaowqxfnuRkpbwKjMySwtrfhhOwBrAmxcWPPEXIUJtaXiNRFIrZUybcsvHObBevufnNEhufpqxmzRHzUwqsAaSyBuWUwIhTfxfsuANYNLkeBocbnHteKlvUMpMJLaigJdHCmPEUjSepqowMSvgpOCJtCLfFnDMncDVYhZoYCZurGGe
        Source: 2name.exe, 00000002.00000002.293211794.00000000028B1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
        Source: 2name.exe, 00000002.00000002.293211794.00000000028B1000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: 2name.exe, 00000002.00000002.293211794.00000000028B1000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: 2name.exe, 00000002.00000002.293211794.00000000028B1000.00000004.00000001.sdmpBinary or memory string: kr87HKEY_LOCAL_MACHINE\SOFTWARE\VMware, Inc.\VMware Tools\.
        Source: 2name.exe, 00000002.00000002.291497957.0000000000932000.00000004.00000020.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareULWRT6SEWin32_VideoControllerR3PNAUW9VideoController120060621000000.000000-000.8355.36display.infMSBDAHH3KYOFKPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsP9_R1FNA
        Source: wscript.exe, 00000000.00000003.208113503.0000019EB0303000.00000004.00000001.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Te
        Source: wscript.exe, 00000000.00000002.211623017.0000019EB28A0000.00000002.00000001.sdmp, 2name.exe, 00000010.00000002.480786850.0000000005A40000.00000002.00000001.sdmp, file1.exe, 00000015.00000002.472979252.0000000001390000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: 2name.exe, 00000002.00000002.293211794.00000000028B1000.00000004.00000001.sdmpBinary or memory string: kr&%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: 2name.exe, 00000010.00000002.472266625.00000000011C5000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW\user\AppData
        Source: wscript.exe, 00000000.00000002.211623017.0000019EB28A0000.00000002.00000001.sdmp, 2name.exe, 00000010.00000002.480786850.0000000005A40000.00000002.00000001.sdmp, file1.exe, 00000015.00000002.472979252.0000000001390000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\file1.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Benign windows process drops PE filesShow sources
        Source: C:\Windows\System32\wscript.exeFile created: file1.exe.0.drJump to dropped file
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\AppData\Local\Temp\file1.exeMemory written: C:\Users\user\AppData\Local\Temp\file1.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\AppData\Local\Temp\2name.exeMemory written: C:\Users\user\AppData\Local\Temp\2name.exe base: 400000 value starts with: 4D5A
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\file1.exe 'C:\Users\user\AppData\Local\Temp\file1.exe'
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\2name.exe 'C:\Users\user\AppData\Local\Temp\2name.exe'
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\HHyKJahmIz' /XML 'C:\Users\user\AppData\Local\Temp\tmpC46.tmp'
        Source: C:\Users\user\AppData\Local\Temp\file1.exeProcess created: C:\Users\user\AppData\Local\Temp\file1.exe {path}
        Source: C:\Users\user\AppData\Local\Temp\2name.exeProcess created: C:\Users\user\AppData\Local\Temp\2name.exe {path}
        Source: 2name.exe, 00000010.00000002.473284128.00000000019A0000.00000002.00000001.sdmp, file1.exe, 00000015.00000002.478984114.000000000345E000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: 2name.exe, 00000010.00000002.473284128.00000000019A0000.00000002.00000001.sdmp, file1.exe, 00000015.00000002.473894557.00000000019F0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: 2name.exe, 00000010.00000002.473284128.00000000019A0000.00000002.00000001.sdmp, file1.exe, 00000015.00000002.473894557.00000000019F0000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: 2name.exe, 00000010.00000002.473284128.00000000019A0000.00000002.00000001.sdmp, file1.exe, 00000015.00000002.473894557.00000000019F0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: file1.exe, 00000015.00000002.478915985.0000000003400000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\2name.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 1_2_05152102 GetUserNameA,
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected AgentTeslaShow sources
        Source: Yara matchFile source: 00000010.00000002.468518858.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.311010210.000000000CDE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.294907318.00000000038B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.288308557.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 2.2.2name.exe.ce83cb8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.2name.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.2name.exe.ce83cb8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.2name.exe.400000.1.unpack, type: UNPACKEDPE
        Yara detected AgentTeslaShow sources
        Source: Yara matchFile source: 00000010.00000002.468518858.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.311010210.000000000CDE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.294907318.00000000038B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.288308557.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 2name.exe PID: 5828, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 2name.exe PID: 5004, type: MEMORY
        Source: Yara matchFile source: 2.2.2name.exe.ce83cb8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.2name.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.2name.exe.ce83cb8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.2name.exe.400000.1.unpack, type: UNPACKEDPE
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000015.00000002.479174515.0000000004334000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.291952352.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.468642288.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.297937965.0000000003F51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.307230936.000000000D351000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.292645242.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.480599769.0000000005C00000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: file1.exe PID: 4076, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: file1.exe PID: 5784, type: MEMORY
        Source: Yara matchFile source: 21.2.file1.exe.4346f00.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.file1.exe.d3e8eb8.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.4346f00.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.file1.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.434b529.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.file1.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.5c00000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.5c04629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.file1.exe.d3e8eb8.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.file1.exe.3fbb588.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.5c00000.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 2name.exe PID: 5004, type: MEMORY

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: file1.exe, 00000001.00000002.297937965.0000000003F51000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: file1.exe, 00000015.00000002.479174515.0000000004334000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: file1.exe, 00000015.00000002.479905732.0000000005680000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected AgentTeslaShow sources
        Source: Yara matchFile source: 00000010.00000002.468518858.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.311010210.000000000CDE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.294907318.00000000038B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.288308557.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 2.2.2name.exe.ce83cb8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.2name.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.2name.exe.ce83cb8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.2name.exe.400000.1.unpack, type: UNPACKEDPE
        Yara detected AgentTeslaShow sources
        Source: Yara matchFile source: 00000010.00000002.468518858.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.311010210.000000000CDE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.294907318.00000000038B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.288308557.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 2name.exe PID: 5828, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 2name.exe PID: 5004, type: MEMORY
        Source: Yara matchFile source: 2.2.2name.exe.ce83cb8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.2name.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.2name.exe.ce83cb8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.2name.exe.400000.1.unpack, type: UNPACKEDPE
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000015.00000002.479174515.0000000004334000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.291952352.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.468642288.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.297937965.0000000003F51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.307230936.000000000D351000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.292645242.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.480599769.0000000005C00000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: file1.exe PID: 4076, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: file1.exe PID: 5784, type: MEMORY
        Source: Yara matchFile source: 21.2.file1.exe.4346f00.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.file1.exe.d3e8eb8.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.4346f00.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.file1.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.434b529.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.file1.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.5c00000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.5c04629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.file1.exe.d3e8eb8.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.file1.exe.3fbb588.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.file1.exe.5c00000.11.unpack, type: UNPACKEDPE
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_055E247A bind,
        Source: C:\Users\user\AppData\Local\Temp\file1.exeCode function: 21_2_055E2428 bind,

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation311DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools11Input Capture21Account Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScripting121Scheduled Task/Job1Access Token Manipulation1Deobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture21Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsNative API1Logon Script (Windows)Process Injection112Scripting121Security Account ManagerSystem Information Discovery114SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsExploitation for Client Execution1Logon Script (Mac)Scheduled Task/Job1Obfuscated Files or Information3NTDSQuery Registry1Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsScheduled Task/Job1Network Logon ScriptNetwork Logon ScriptSoftware Packing22LSA SecretsSecurity Software Discovery321SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol1Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonDLL Side-Loading1Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol111Jamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsMasquerading1DCSyncVirtualization/Sandbox Evasion241Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobVirtualization/Sandbox Evasion241Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Access Token Manipulation1/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
        Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Process Injection112Network SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
        Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronHidden Files and Directories1Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 433519 Sample: Invoice#06-11-2021_PDF.vbs Startdate: 12/06/2021 Architecture: WINDOWS Score: 100 40 clientconfig.passport.net 2->40 50 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 13 other signatures 2->56 9 wscript.exe 3 2->9         started        signatures3 process4 file5 32 C:\Users\user\AppData\Local\Temp\file1.exe, PE32 9->32 dropped 34 C:\Users\user\AppData\Local\Temp\2name.exe, PE32 9->34 dropped 60 Benign windows process drops PE files 9->60 62 VBScript performs obfuscated calls to suspicious functions 9->62 13 file1.exe 6 9->13         started        17 2name.exe 3 9->17         started        signatures6 process7 file8 36 C:\Users\user\AppData\...\HHyKJahmIz.exe, PE32 13->36 dropped 38 C:\Users\user\AppData\Local\Temp\tmpC46.tmp, XML 13->38 dropped 64 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 13->64 66 Machine Learning detection for dropped file 13->66 68 Uses schtasks.exe or at.exe to add and modify task schedules 13->68 19 file1.exe 9 13->19         started        24 schtasks.exe 1 13->24         started        70 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 17->70 72 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 17->72 74 Injects a PE file into a foreign processes 17->74 76 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 17->76 26 2name.exe 4 17->26         started        signatures9 process10 dnsIp11 42 191.96.25.26, 11940, 49731, 49735 AS40676US Chile 19->42 44 sys2021.linkpc.net 52.39.28.134, 11940 AMAZON-02US United States 19->44 30 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 19->30 dropped 58 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->58 28 conhost.exe 24->28         started        46 jetport-aero.com 217.182.175.206, 49736, 49744, 49745 OVHFR France 26->46 48 mail.jetport-aero.com 26->48 file12 signatures13 process14

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        No Antivirus matches

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\HHyKJahmIz.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\file1.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\2name.exe100%Joe Sandbox ML

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        21.2.file1.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        21.2.file1.exe.4346f00.5.unpack100%AviraTR/NanoCore.fadteDownload File
        21.0.file1.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        21.0.file1.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        16.2.2name.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
        21.2.file1.exe.5c00000.11.unpack100%AviraTR/NanoCore.fadteDownload File
        16.0.2name.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File

        Domains

        SourceDetectionScannerLabelLink
        clientconfig.passport.net0%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        0%Avira URL Cloudsafe
        http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
        http://www.carterandcone.comn-u0%URL Reputationsafe
        http://www.carterandcone.comn-u0%URL Reputationsafe
        http://www.carterandcone.comn-u0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.sajatypeworks.com40%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Y0/X0%Avira URL Cloudsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://r3.i.lencr.org/0/0%Avira URL Cloudsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.fonts.comic0%URL Reputationsafe
        http://www.fonts.comic0%URL Reputationsafe
        http://www.fonts.comic0%URL Reputationsafe
        http://www.founder.com.cn/cnk0%Avira URL Cloudsafe
        http://www.carterandcone.comC0%URL Reputationsafe
        http://www.carterandcone.comC0%URL Reputationsafe
        http://www.carterandcone.comC0%URL Reputationsafe
        http://x1.c.lencr.org/00%URL Reputationsafe
        http://x1.c.lencr.org/00%URL Reputationsafe
        http://x1.c.lencr.org/00%URL Reputationsafe
        http://x1.i.lencr.org/00%URL Reputationsafe
        http://x1.i.lencr.org/00%URL Reputationsafe
        http://x1.i.lencr.org/00%URL Reputationsafe
        http://gKSfZA.com0%Avira URL Cloudsafe
        http://r3.o.lencr.org00%URL Reputationsafe
        http://r3.o.lencr.org00%URL Reputationsafe
        http://r3.o.lencr.org00%URL Reputationsafe
        http://www.fonts.comn0%URL Reputationsafe
        http://www.fonts.comn0%URL Reputationsafe
        http://www.fonts.comn0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.fontbureau.comgrito0%URL Reputationsafe
        http://www.fontbureau.comgrito0%URL Reputationsafe
        http://www.fontbureau.comgrito0%URL Reputationsafe
        https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
        https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
        https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.galapagosdesign.com/c0%Avira URL Cloudsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
        http://x1.i.len0%Avira URL Cloudsafe
        http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
        http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
        http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://DynDns.comDynDNS0%URL Reputationsafe
        http://DynDns.comDynDNS0%URL Reputationsafe
        http://DynDns.comDynDNS0%URL Reputationsafe
        http://www.fonts.comc0%URL Reputationsafe
        http://www.fonts.comc0%URL Reputationsafe
        http://www.fonts.comc0%URL Reputationsafe
        http://www.agfamonotype.0%URL Reputationsafe
        http://www.agfamonotype.0%URL Reputationsafe
        http://www.agfamonotype.0%URL Reputationsafe
        http://cps.letsencrypt.org00%URL Reputationsafe
        http://cps.letsencrypt.org00%URL Reputationsafe
        http://cps.letsencrypt.org00%URL Reputationsafe
        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        sys2021.linkpc.net
        52.39.28.134
        truefalse
          high
          jetport-aero.com
          217.182.175.206
          truetrue
            unknown
            mail.jetport-aero.com
            unknown
            unknowntrue
              unknown
              clientconfig.passport.net
              unknown
              unknownfalseunknown

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              true
              • Avira URL Cloud: safe
              low
              sys2021.linkpc.netfalse
                high

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.12name.exe, 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://www.fontbureau.com/designersGfile1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                  high
                  http://www.carterandcone.comn-u2name.exe, 00000002.00000003.210776108.0000000000D3D000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/?file1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bThefile1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.com4file1.exe, 00000001.00000003.208338149.00000000052BB000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers?file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                      high
                      http://www.tiro.com2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.298084668.0000000004E70000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                        high
                        http://www.goodfont.co.krfile1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.com2name.exe, 00000002.00000003.210776108.0000000000D3D000.00000004.00000001.sdmp, 2name.exe, 00000002.00000003.211318733.0000000004D03000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/Y0/X2name.exe, 00000002.00000003.211507950.0000000004D03000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.sajatypeworks.comfile1.exe, 00000001.00000003.208338149.00000000052BB000.00000004.00000001.sdmp, file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.298084668.0000000004E70000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://r3.i.lencr.org/0/2name.exe, 00000010.00000002.482353717.00000000075D0000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.typography.netDfile1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/cThefile1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.298084668.0000000004E70000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmfile1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, file1.exe, 00000001.00000003.213754536.00000000052A4000.00000004.00000001.sdmp, 2name.exe, 00000002.00000003.214409435.0000000004D19000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comfile1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, file1.exe, 00000001.00000003.208580143.00000000052BB000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.298084668.0000000004E70000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fonts.comicfile1.exe, 00000001.00000003.208338149.00000000052BB000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnkfile1.exe, 00000001.00000003.209781217.00000000052A4000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.carterandcone.comC2name.exe, 00000002.00000003.211273379.0000000004D0D000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://x1.c.lencr.org/02name.exe, 00000010.00000002.482353717.00000000075D0000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://x1.i.lencr.org/02name.exe, 00000010.00000002.482353717.00000000075D0000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://gKSfZA.com2name.exe, 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://r3.o.lencr.org02name.exe, 00000010.00000002.482353717.00000000075D0000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fonts.comnfile1.exe, 00000001.00000003.208338149.00000000052BB000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/DPleasefile1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comgritofile1.exe, 00000001.00000002.294083787.0000000001147000.00000004.00000040.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.org%GETMozilla/5.02name.exe, 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        http://www.fonts.comfile1.exe, 00000001.00000003.208338149.00000000052BB000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.298084668.0000000004E70000.00000002.00000001.sdmpfalse
                          high
                          http://www.sandoll.co.krfile1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/cfile1.exe, 00000001.00000003.213306168.00000000052DD000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.urwpp.deDPleasefile1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cnfile1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.sakkal.comfile1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000003.211690154.0000000004D17000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip2name.exe, 00000002.00000002.311010210.000000000CDE1000.00000004.00000001.sdmp, 2name.exe, 00000010.00000002.468518858.0000000000402000.00000040.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://x1.i.len2name.exe, 00000010.00000002.482412718.000000000760F000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://cps.root-x1.letsencrypt.org02name.exe, 00000010.00000002.482353717.00000000075D0000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.298084668.0000000004E70000.00000002.00000001.sdmpfalse
                            high
                            http://www.fontbureau.comfile1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                              high
                              http://www.galapagosdesign.com/file1.exe, 00000001.00000003.213306168.00000000052DD000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://DynDns.comDynDNS2name.exe, 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fonts.comcfile1.exe, 00000001.00000003.208373034.00000000052BB000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.agfamonotype.2name.exe, 00000002.00000003.215138787.0000000004D1E000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://cps.letsencrypt.org02name.exe, 00000010.00000002.482353717.00000000075D0000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha2name.exe, 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              https://api.ipify.org%(2name.exe, 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              http://www.jiyu-kobo.co.jp/A2name.exe, 00000002.00000003.211507950.0000000004D03000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/jp/2name.exe, 00000002.00000003.211507950.0000000004D03000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/frer2name.exe, 00000002.00000003.212658288.0000000004D15000.00000004.00000001.sdmpfalse
                                high
                                http://www.carterandcone.comlfile1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNfile1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cnfile1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-jones.htmlfile1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                                    high
                                    http://r3.i.lencr.org/0m2name.exe, 00000010.00000002.482412718.000000000760F000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/s2name.exe, 00000002.00000003.211507950.0000000004D03000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/r2name.exe, 00000002.00000003.211318733.0000000004D03000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.monotype.2name.exe, 00000002.00000003.214932192.0000000004D0E000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/file1.exe, 00000001.00000002.303254144.0000000006532000.00000004.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8file1.exe, 00000001.00000002.298962464.0000000005410000.00000002.00000001.sdmp, 2name.exe, 00000002.00000002.299542442.0000000005F02000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.fontbureau.comionu2name.exe, 00000002.00000002.297889020.0000000004D00000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://w5tNnUBgMNAftBN.net2name.exe, 00000010.00000002.478136134.00000000033C3000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fonts.com8file1.exe, 00000001.00000003.208338149.00000000052BB000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown

                                      Contacted IPs

                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs

                                      Public

                                      IPDomainCountryFlagASNASN NameMalicious
                                      191.96.25.26
                                      unknownChile
                                      40676AS40676UStrue
                                      52.39.28.134
                                      sys2021.linkpc.netUnited States
                                      16509AMAZON-02USfalse
                                      217.182.175.206
                                      jetport-aero.comFrance
                                      16276OVHFRtrue

                                      General Information

                                      Joe Sandbox Version:32.0.0 Black Diamond
                                      Analysis ID:433519
                                      Start date:12.06.2021
                                      Start time:08:07:21
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 11m 54s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:Invoice#06-11-2021_PDF.vbs
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:37
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winVBS@12/8@5/3
                                      EGA Information:Failed
                                      HDC Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Found application associated with file extension: .vbs
                                      Warnings:
                                      Show All
                                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                      • TCP Packets have been reduced to 100
                                      • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, HxTsr.exe, RuntimeBroker.exe, wermgr.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 13.64.90.137, 84.53.167.113, 2.17.179.193, 20.190.160.129, 20.190.160.132, 20.190.160.69, 20.190.160.134, 20.190.160.2, 20.190.160.4, 20.190.160.67, 20.190.160.73, 93.184.220.29, 88.221.62.148, 92.123.150.225, 23.218.209.198, 204.79.197.200, 13.107.21.200, 20.50.102.62, 23.218.208.56, 92.122.145.220, 13.107.42.23, 13.107.5.88, 20.82.210.154, 92.122.213.194, 92.122.213.247
                                      • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, www.tm.lg.prod.aadmsa.akadns.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, cdn.onenote.net.edgekey.net, e11290.dspg.akamaiedge.net, e13551.dscg.akamaiedge.net, ocsp.digicert.com, wildcard.weather.microsoft.com.edgekey.net, login.live.com, www-bing-com.dual-a-0001.a-msedge.net, watson.telemetry.microsoft.com, www.bing.com, fs.microsoft.com, afdo-tas-offload.trafficmanager.net, dual-a-0001.a-msedge.net, www.tm.a.prd.aadg.akadns.net, storeedgefd.dsx.mp.microsoft.com.edgekey.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, e1553.dspg.akamaiedge.net, storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, ocos-office365-s2s.msedge.net, client-office365-tas.msedge.net, config.edge.skype.com.trafficmanager.net, store-images.s-microsoft.com-c.edgekey.net, e-0009.e-msedge.net, config-edge-skype.l-0014.l-msedge.net, e15275.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, l-0014.config.skype.com, a1449.dscg2.akamai.net, storeedgefd.xbetservices.akadns.net, arc.msn.com, msagfx.live.com-6.edgekey.net, e12564.dspb.akamaiedge.net, authgfx.msa.akadns6.net, go.microsoft.com, arc.trafficmanager.net, img-prod-cms-rt-microsoft-com.akamaized.net, cdn.onenote.net, prod.fs.microsoft.com.akadns.net, config.edge.skype.com, storeedgefd.dsx.mp.microsoft.com, skypedataprdcolwus17.cloudapp.net, tile-service.weather.microsoft.com, e1723.g.akamaiedge.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, login.msa.msidentity.com, ocos-office365-s2s-msedge-net.e-0009.e-msedge.net, a-0001.a-afdentry.net.trafficmanager.net, go.microsoft.com.edgekey.net, e16646.dscg.akamaiedge.net, l-0014.l-msedge.net
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.

                                      Simulations

                                      Behavior and APIs

                                      TimeTypeDescription
                                      08:08:52API Interceptor662x Sleep call for process: file1.exe modified
                                      08:08:56API Interceptor658x Sleep call for process: 2name.exe modified

                                      Joe Sandbox View / Context

                                      IPs

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      191.96.25.26Invoice Payment_PDF.vbsGet hashmaliciousBrowse
                                        Invoice for B1019855_PDF.vbsGet hashmaliciousBrowse
                                          02_extracted.exeGet hashmaliciousBrowse
                                            Invoice No B1019855_PDF.vbsGet hashmaliciousBrowse
                                              02_extracted.exeGet hashmaliciousBrowse
                                                03_extracted.exeGet hashmaliciousBrowse
                                                  Invoice No F1019855_PDF.vbsGet hashmaliciousBrowse
                                                    Invoice No F1019855_PDF.vbsGet hashmaliciousBrowse
                                                      Spec_PDF.vbsGet hashmaliciousBrowse
                                                        SpecPDF.vbsGet hashmaliciousBrowse
                                                          52.39.28.13402_extracted.exeGet hashmaliciousBrowse
                                                            217.182.175.206Invoice Payment_PDF.vbsGet hashmaliciousBrowse
                                                              Invoice for B1019855_PDF.vbsGet hashmaliciousBrowse
                                                                01_extracted.exeGet hashmaliciousBrowse
                                                                  Invoice No B1019855_PDF.vbsGet hashmaliciousBrowse
                                                                    9e7d034c_by_Libranalysis.xlsmGet hashmaliciousBrowse
                                                                      SecuriteInfo.com.VB.Trojan.Valyria.4579.10155.xlsmGet hashmaliciousBrowse
                                                                        SecuriteInfo.com.VB.Trojan.Valyria.4579.10155.xlsmGet hashmaliciousBrowse

                                                                          Domains

                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                          sys2021.linkpc.netInvoice Payment_PDF.vbsGet hashmaliciousBrowse
                                                                          • 51.178.229.162
                                                                          Invoice for B1019855_PDF.vbsGet hashmaliciousBrowse
                                                                          • 51.178.229.162
                                                                          02_extracted.exeGet hashmaliciousBrowse
                                                                          • 52.39.28.134
                                                                          Invoice No B1019855_PDF.vbsGet hashmaliciousBrowse
                                                                          • 51.210.201.99
                                                                          01_extracted.exeGet hashmaliciousBrowse
                                                                          • 46.105.77.230
                                                                          02_extracted.exeGet hashmaliciousBrowse
                                                                          • 46.105.77.230
                                                                          02_extracted.exeGet hashmaliciousBrowse
                                                                          • 79.137.109.121
                                                                          03_extracted.exeGet hashmaliciousBrowse
                                                                          • 79.137.109.121
                                                                          Invoice No F1019855_PDF.vbsGet hashmaliciousBrowse
                                                                          • 87.98.245.48
                                                                          Invoice No F1019855_PDF.vbsGet hashmaliciousBrowse
                                                                          • 79.137.109.121
                                                                          Spec_PDF.vbsGet hashmaliciousBrowse
                                                                          • 105.112.11.245
                                                                          SpecPDF.vbsGet hashmaliciousBrowse
                                                                          • 179.43.166.32

                                                                          ASN

                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                          OVHFRJHSkaPIXXA.exeGet hashmaliciousBrowse
                                                                          • 51.254.187.177
                                                                          CBI8Rv3xZ7.dllGet hashmaliciousBrowse
                                                                          • 51.77.82.110
                                                                          hcTYYoyYOS.dllGet hashmaliciousBrowse
                                                                          • 51.77.82.110
                                                                          CBI8Rv3xZ7.dllGet hashmaliciousBrowse
                                                                          • 51.77.82.110
                                                                          hcTYYoyYOS.dllGet hashmaliciousBrowse
                                                                          • 51.77.82.110
                                                                          Purchase_Order.exeGet hashmaliciousBrowse
                                                                          • 213.186.33.5
                                                                          ORDER-21611docx.exeGet hashmaliciousBrowse
                                                                          • 87.98.245.48
                                                                          s6ljEIsdF3.exeGet hashmaliciousBrowse
                                                                          • 176.31.95.228
                                                                          hb5swSGLBT.exeGet hashmaliciousBrowse
                                                                          • 176.31.95.228
                                                                          CM0Q30sK3K.exeGet hashmaliciousBrowse
                                                                          • 176.31.95.228
                                                                          zIrx1wUddJ.exeGet hashmaliciousBrowse
                                                                          • 144.217.14.109
                                                                          8qdfmqz1PN.exeGet hashmaliciousBrowse
                                                                          • 51.222.56.151
                                                                          New Order PO2193570O1.docGet hashmaliciousBrowse
                                                                          • 51.222.56.151
                                                                          New Order PO2193570O1.pdf.exeGet hashmaliciousBrowse
                                                                          • 51.222.56.151
                                                                          Request For Quote.exeGet hashmaliciousBrowse
                                                                          • 158.69.138.23
                                                                          payload.htmlGet hashmaliciousBrowse
                                                                          • 145.239.131.60
                                                                          6VYNUalwUt.exeGet hashmaliciousBrowse
                                                                          • 178.33.222.241
                                                                          New Inquiry.exeGet hashmaliciousBrowse
                                                                          • 158.69.138.23
                                                                          New Order TL273723734533.pdf.exeGet hashmaliciousBrowse
                                                                          • 51.222.56.151
                                                                          Requestforquote.exeGet hashmaliciousBrowse
                                                                          • 158.69.138.23
                                                                          AMAZON-02USCIGi9PIHbu.exeGet hashmaliciousBrowse
                                                                          • 3.18.3.168
                                                                          research-1234799369.xlsbGet hashmaliciousBrowse
                                                                          • 52.220.160.98
                                                                          microsoft office 2007 service pack 2.exeGet hashmaliciousBrowse
                                                                          • 13.248.148.254
                                                                          ws8W4yPAvg.exeGet hashmaliciousBrowse
                                                                          • 3.22.15.135
                                                                          UOMp9cDcqZ.exeGet hashmaliciousBrowse
                                                                          • 52.58.78.16
                                                                          OrderKLB210568.exeGet hashmaliciousBrowse
                                                                          • 34.215.126.147
                                                                          q7jxy6gZMb.exeGet hashmaliciousBrowse
                                                                          • 104.192.141.1
                                                                          b9f5bca9a22f08aad48674bc42e4eaf72ab8aa3d652ba.exeGet hashmaliciousBrowse
                                                                          • 52.219.158.14
                                                                          8BDBD0yy0q.apkGet hashmaliciousBrowse
                                                                          • 52.17.153.103
                                                                          8BDBD0yy0q.apkGet hashmaliciousBrowse
                                                                          • 13.224.195.88
                                                                          ehDnx4Ke5d.exeGet hashmaliciousBrowse
                                                                          • 3.22.15.135
                                                                          KY4cmAI0jU.exeGet hashmaliciousBrowse
                                                                          • 3.34.12.41
                                                                          c71fd2gJus.exeGet hashmaliciousBrowse
                                                                          • 52.219.64.3
                                                                          XQehPgTn35.exeGet hashmaliciousBrowse
                                                                          • 3.136.65.236
                                                                          E1a92ARmPw.exeGet hashmaliciousBrowse
                                                                          • 35.157.179.180
                                                                          crt9O3URua.exeGet hashmaliciousBrowse
                                                                          • 35.157.179.180
                                                                          E1a92ARmPw.exeGet hashmaliciousBrowse
                                                                          • 52.218.105.219
                                                                          DNPr7t0GMY.exeGet hashmaliciousBrowse
                                                                          • 13.59.53.244
                                                                          lTAPQJikGw.exeGet hashmaliciousBrowse
                                                                          • 99.83.154.118
                                                                          SKlGhwkzTi.exeGet hashmaliciousBrowse
                                                                          • 44.227.65.245
                                                                          AS40676USlTAPQJikGw.exeGet hashmaliciousBrowse
                                                                          • 172.107.55.6
                                                                          KI91QtYDef.exeGet hashmaliciousBrowse
                                                                          • 104.217.8.109
                                                                          quotation zip.exeGet hashmaliciousBrowse
                                                                          • 185.215.224.53
                                                                          template-jn02b3.dotGet hashmaliciousBrowse
                                                                          • 207.231.106.130
                                                                          y31Lwif2sE.lnkGet hashmaliciousBrowse
                                                                          • 45.61.138.207
                                                                          MJH.exeGet hashmaliciousBrowse
                                                                          • 46.243.207.43
                                                                          Swift copy_9808.exeGet hashmaliciousBrowse
                                                                          • 104.217.141.243
                                                                          Document_46161561.xlsGet hashmaliciousBrowse
                                                                          • 107.160.244.54
                                                                          ICNdIx3GY1.exeGet hashmaliciousBrowse
                                                                          • 104.217.8.122
                                                                          SecuriteInfo.com.WinGo.GoCLR.A.24820.exeGet hashmaliciousBrowse
                                                                          • 45.61.136.223
                                                                          cb5b3ec1be5f432cec70fbea8d525210ef25570b56fba.exeGet hashmaliciousBrowse
                                                                          • 104.217.8.122
                                                                          1VdxXmBPdY.exeGet hashmaliciousBrowse
                                                                          • 104.217.8.122
                                                                          62lNIwplP8.exeGet hashmaliciousBrowse
                                                                          • 45.61.136.223
                                                                          iBpCEHz2q4.exeGet hashmaliciousBrowse
                                                                          • 104.217.8.122
                                                                          Invoice Payment_PDF.vbsGet hashmaliciousBrowse
                                                                          • 191.96.25.26
                                                                          Y8bZnrFXSo.exeGet hashmaliciousBrowse
                                                                          • 104.217.8.122
                                                                          ZqdsbHIY5d.exeGet hashmaliciousBrowse
                                                                          • 104.217.8.122
                                                                          wfIHlX06iC.exeGet hashmaliciousBrowse
                                                                          • 104.217.8.122
                                                                          ftl1MRlCZu.exeGet hashmaliciousBrowse
                                                                          • 104.217.8.122
                                                                          Fki4Q91Cvm.exeGet hashmaliciousBrowse
                                                                          • 104.217.8.122

                                                                          JA3 Fingerprints

                                                                          No context

                                                                          Dropped Files

                                                                          No context

                                                                          Created / dropped Files

                                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\2name.exe.log
                                                                          Process:C:\Users\user\AppData\Local\Temp\2name.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):655
                                                                          Entropy (8bit):5.273171405160065
                                                                          Encrypted:false
                                                                          SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9t0U2WUXBQav:MLF20NaL329hJ5g522rWz2p29XBT
                                                                          MD5:2703120C370FBB4A8BA08C6D1754039E
                                                                          SHA1:EC0DB47BF00A4A828F796147619386C0BBEA66A1
                                                                          SHA-256:F95566974BC44F3A757CAFB1456D185D8F333AC84775089DE18310B90C18B1BC
                                                                          SHA-512:BC05A2A1BE5B122FC6D3DEA66EF4258522F13351B9754378395AAD019631E312CFD3BC990F3E3D5C7BB0BDBA1EAD54A2B34A96DEE2FCCD703721E98F6192ED48
                                                                          Malicious:false
                                                                          Reputation:moderate, very likely benign file
                                                                          Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\4de99804c29261edb63c93616550f034\System.Management.ni.dll",0..
                                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\file1.exe.log
                                                                          Process:C:\Users\user\AppData\Local\Temp\file1.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):655
                                                                          Entropy (8bit):5.273171405160065
                                                                          Encrypted:false
                                                                          SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9t0U2WUXBQav:MLF20NaL329hJ5g522rWz2p29XBT
                                                                          MD5:2703120C370FBB4A8BA08C6D1754039E
                                                                          SHA1:EC0DB47BF00A4A828F796147619386C0BBEA66A1
                                                                          SHA-256:F95566974BC44F3A757CAFB1456D185D8F333AC84775089DE18310B90C18B1BC
                                                                          SHA-512:BC05A2A1BE5B122FC6D3DEA66EF4258522F13351B9754378395AAD019631E312CFD3BC990F3E3D5C7BB0BDBA1EAD54A2B34A96DEE2FCCD703721E98F6192ED48
                                                                          Malicious:false
                                                                          Reputation:moderate, very likely benign file
                                                                          Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\4de99804c29261edb63c93616550f034\System.Management.ni.dll",0..
                                                                          C:\Users\user\AppData\Local\Temp\2name.exe
                                                                          Process:C:\Windows\System32\wscript.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):726016
                                                                          Entropy (8bit):7.460683048230593
                                                                          Encrypted:false
                                                                          SSDEEP:12288:s4Vk+Co34f3xqyPOdN7CEd6ytjAzYhoWtaGiVXRwO:sUCo34gyWdN7H6SDzAjJRwO
                                                                          MD5:CF4CD927CCC626FB016D0E91CF6BD456
                                                                          SHA1:16C9EA9C6050EC976537ADE42C5C049F7AF2599B
                                                                          SHA-256:03D512E79C0748CC83D5BCB4B8847534D7E81D929DAB496727ACBEEC1A5FD694
                                                                          SHA-512:422F85A2D020E87D9936668C3D4863C49503FD62070BD6A80B5334FBAA77A55C4095FB53AAB2015498133FAD3FF65CC98090A6C012D9B2F325702016BB51D215
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          Reputation:low
                                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............0..............(... ...@....@.. ....................................@.................................p(..O....@.......................`......8'............................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................(......H.......D...,)..........p,................................................r...p}......}.....(.......(.....*..0............{....o....r[..p(....-\.{....o....r[..p(....-E.{....o....r[..p(....-..{....o....r[..p(....-..{....o....r[..p(....+....,..r]..p(....&+.**...(.....*..*...0..+.........,..{.......+....,...{....o........(.....*..0..N.............(....s......s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s
                                                                          C:\Users\user\AppData\Local\Temp\file1.exe
                                                                          Process:C:\Windows\System32\wscript.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):756224
                                                                          Entropy (8bit):7.493608714130465
                                                                          Encrypted:false
                                                                          SSDEEP:12288:S42kl8+drZTnwWp/OdrFYU+8hs3pVo1f9majwN9DLHvBYWSsVWSy:SY8+drZrp2d6P3pVo1vydrvBYeV9
                                                                          MD5:07C82C84BAEC92953A270419C72D7F10
                                                                          SHA1:DB68FCB828195BC4556E8A4725BA1BF5057A7C56
                                                                          SHA-256:074EE7EF8958EA94C8E5B35D87DAE1B8CFBA9FAF46FB15D61C740FBFD600D758
                                                                          SHA-512:C70D0AE16A4BDF285DF963B3E80A0737DD7AD9D5B5A82EFFCBA5CF274E1CC96C3B2607D1AFE26AB8E86788C0FA5E7AE903743D70EDDA7F2DFE8EA8DCCEFE5F2F
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          Reputation:low
                                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...m..`..............0................. ........@.. ....................................@.....................................O...................................`................................................ ............... ..H............text....~... ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H.......D...4)..........x,...p............................................r...p}......}.....(.......(.....*..0............{....o....r[..p(....-\.{....o....r[..p(....-E.{....o....r[..p(....-..{....o....r[..p(....-..{....o....r[..p(....+....,..r]..p(....&+.**...(.....*..*...0..+.........,..{.......+....,...{....o........(.....*..0..N.............(....s......s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s
                                                                          C:\Users\user\AppData\Local\Temp\tmpC46.tmp
                                                                          Process:C:\Users\user\AppData\Local\Temp\file1.exe
                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):1643
                                                                          Entropy (8bit):5.193758749843159
                                                                          Encrypted:false
                                                                          SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBgtn:cbh47TlNQ//rydbz9I3YODOLNdq3c
                                                                          MD5:65835A3FDB40FADC683FF7C737DD45B8
                                                                          SHA1:B4F8BAC9E41E723EB171ABC7395CC19A318BE781
                                                                          SHA-256:5732AC8EE9ECD64FAE6A998D5BBEB68E9B06309DE048562B5394AAAF49131B76
                                                                          SHA-512:18A61873F4520F2C61A1289C23797D9DD5BFC4481E4F89016AC77981FA3DA6D90DAF821DB2154607B9444DF3D15919E442798DB15F5A2DB5F8B921928D51D97B
                                                                          Malicious:true
                                                                          Reputation:low
                                                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                                          Process:C:\Users\user\AppData\Local\Temp\file1.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):696
                                                                          Entropy (8bit):7.089541637477408
                                                                          Encrypted:false
                                                                          SSDEEP:12:X4LEnybgCF0uCYKZr+dLEnybgCF0uCYKZr+dLEnybgCF0uCYKZr+K:IQnybgC4jh+dQnybgC4jh+dQnybgC4jp
                                                                          MD5:AF6AA7C823112E2342E8D98BE5EDE0A9
                                                                          SHA1:D48CA92F4FA11CC9619185563F2D57A6099D21D0
                                                                          SHA-256:8D2ACD0CB78A2C690E2DCA1E9C92D273DAF4804DF0B4AC55E14D120C96F7671D
                                                                          SHA-512:B822403E85339F4FF2D88608D73DA75A149756FF44454386E1EB2451A6CCCE0F65ECA596F95BBBAD942C963F8C4CA2ADE582D6E50750596DB263BA879FB3ECE1
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&
                                                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                          Process:C:\Users\user\AppData\Local\Temp\file1.exe
                                                                          File Type:ISO-8859 text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):8
                                                                          Entropy (8bit):3.0
                                                                          Encrypted:false
                                                                          SSDEEP:3:bs8t:5t
                                                                          MD5:40198B97616273D9646AB6202B43D7C2
                                                                          SHA1:873C0C9A032CA79138FEE4AC197D6C360185D6BC
                                                                          SHA-256:43F580A134F143DE82F8BA52CEB9736322D918D3C987B56643DC64308B992B6A
                                                                          SHA-512:2CB67B647EA406E4E68BDE03B742CEE25CF88B27EB3D9610B5666B836D4BD4579D5D7FB9F4BB41FBB9751F56D0F4405C4A625ADA36E72D6447ED9F73C09309BA
                                                                          Malicious:true
                                                                          Reputation:low
                                                                          Preview: 6."..-.H
                                                                          C:\Users\user\AppData\Roaming\HHyKJahmIz.exe
                                                                          Process:C:\Users\user\AppData\Local\Temp\file1.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):756224
                                                                          Entropy (8bit):7.493608714130465
                                                                          Encrypted:false
                                                                          SSDEEP:12288:S42kl8+drZTnwWp/OdrFYU+8hs3pVo1f9majwN9DLHvBYWSsVWSy:SY8+drZrp2d6P3pVo1vydrvBYeV9
                                                                          MD5:07C82C84BAEC92953A270419C72D7F10
                                                                          SHA1:DB68FCB828195BC4556E8A4725BA1BF5057A7C56
                                                                          SHA-256:074EE7EF8958EA94C8E5B35D87DAE1B8CFBA9FAF46FB15D61C740FBFD600D758
                                                                          SHA-512:C70D0AE16A4BDF285DF963B3E80A0737DD7AD9D5B5A82EFFCBA5CF274E1CC96C3B2607D1AFE26AB8E86788C0FA5E7AE903743D70EDDA7F2DFE8EA8DCCEFE5F2F
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          Reputation:low
                                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...m..`..............0................. ........@.. ....................................@.....................................O...................................`................................................ ............... ..H............text....~... ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H.......D...4)..........x,...p............................................r...p}......}.....(.......(.....*..0............{....o....r[..p(....-\.{....o....r[..p(....-E.{....o....r[..p(....-..{....o....r[..p(....-..{....o....r[..p(....+....,..r]..p(....&+.**...(.....*..*...0..+.........,..{.......+....,...{....o........(.....*..0..N.............(....s......s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s

                                                                          Static File Info

                                                                          General

                                                                          File type:ASCII text, with very long lines, with CRLF line terminators
                                                                          Entropy (8bit):5.799622098272767
                                                                          TrID:
                                                                          • Visual Basic Script (13500/0) 87.10%
                                                                          • Disk Image (Macintosh), GPT (2000/0) 12.90%
                                                                          File name:Invoice#06-11-2021_PDF.vbs
                                                                          File size:2064477
                                                                          MD5:fcc6014f7ee0539aead5f38b4fe5245e
                                                                          SHA1:2f006d44ad82ca71319a5bf615677016ff7e918b
                                                                          SHA256:699d670809bccdbbdb2ae85d80be86d6fd00586c56e0375df34527d4ec6045cf
                                                                          SHA512:a9dd70d2b62ca41c9704379d57011a71cb661e9d8260cce95226f7dc357a91b59f3f99f6cd6d2d6563aaaa05cb84cf3c0284e3e1de72001eb9d6ab816e4fe208
                                                                          SSDEEP:24576:Xb14lK6ARrnCSZv3nc/4Y6FmALwmZz2nI/lks167U29/nwGNEaRr8I+TaCinTtKl:HrFm0wfIdkv7KGtmwkDtKW
                                                                          File Content Preview:on error resume next..Dim oJKUEaQXRjwWohJKfxRBprCcdayyKzcHoIONamdeSvgNYPTakLyerbyxGiqdcSNSHohfTwksTmitKpDOGYNzAxPNKQGsvzCziOGjhoGobFLFsEmRfcXDFNSJYUVCqsxTkjLwiTgSRZYumKUFdoMTcyuUwwKMSDxjIrUJsqjLvFlfpXWOAQYBfermorAlITzObplvqKMnFBXW..'MOeYawMCewDezhUBqxCcFX

                                                                          File Icon

                                                                          Icon Hash:e8d69ece869a9ec4

                                                                          Network Behavior

                                                                          Snort IDS Alerts

                                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                          06/12/21-08:09:51.251566TCP2025019ET TROJAN Possible NanoCore C2 60B4973111940192.168.2.3191.96.25.26
                                                                          06/12/21-08:09:57.374510TCP2025019ET TROJAN Possible NanoCore C2 60B4973511940192.168.2.3191.96.25.26
                                                                          06/12/21-08:10:03.567163TCP2025019ET TROJAN Possible NanoCore C2 60B4974211940192.168.2.3191.96.25.26
                                                                          06/12/21-08:10:09.685092TCP2025019ET TROJAN Possible NanoCore C2 60B4974311940192.168.2.3191.96.25.26
                                                                          06/12/21-08:10:20.008499TCP2025019ET TROJAN Possible NanoCore C2 60B4974711940192.168.2.3191.96.25.26

                                                                          Network Port Distribution

                                                                          TCP Packets

                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Jun 12, 2021 08:08:54.517092943 CEST4972311940192.168.2.352.39.28.134
                                                                          Jun 12, 2021 08:08:57.526808977 CEST4972311940192.168.2.352.39.28.134
                                                                          Jun 12, 2021 08:09:03.624458075 CEST4972311940192.168.2.352.39.28.134
                                                                          Jun 12, 2021 08:09:15.772313118 CEST4972911940192.168.2.352.39.28.134
                                                                          Jun 12, 2021 08:09:18.797601938 CEST4972911940192.168.2.352.39.28.134
                                                                          Jun 12, 2021 08:09:24.798130989 CEST4972911940192.168.2.352.39.28.134
                                                                          Jun 12, 2021 08:09:34.077712059 CEST4973011940192.168.2.352.39.28.134
                                                                          Jun 12, 2021 08:09:37.080526114 CEST4973011940192.168.2.352.39.28.134
                                                                          Jun 12, 2021 08:09:43.080950022 CEST4973011940192.168.2.352.39.28.134
                                                                          Jun 12, 2021 08:09:50.911637068 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:51.090446949 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:51.090775967 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:51.251565933 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:51.443285942 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:51.443367958 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:51.676435947 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:51.676532984 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:51.856012106 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:51.856105089 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.085388899 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.085504055 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.319720984 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.319824934 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.320794106 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.320816040 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.320833921 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.320849895 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.320895910 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.320954084 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.499878883 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.499907017 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.499921083 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.499936104 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.499950886 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.499965906 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.500056982 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.500143051 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.500155926 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.500160933 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.500231028 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.678024054 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678085089 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678123951 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678163052 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678204060 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678251028 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678263903 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.678293943 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678298950 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.678333044 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678337097 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.678373098 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678385019 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.678411961 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678421974 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.678450108 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678488970 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678525925 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678540945 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.678570986 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.678574085 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678617001 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678653955 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.678714991 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.856555939 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.856616020 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.856647968 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.856678009 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.856718063 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.856735945 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.856758118 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.856790066 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.856796980 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.856812954 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.856847048 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.856852055 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.856892109 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.856904030 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.856930971 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.856941938 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.856971979 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.856981993 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.857012033 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.857017994 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.857049942 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.857060909 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.857089043 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.857101917 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.857126951 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.857137918 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.857177973 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.857183933 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.857223988 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.857228041 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.857261896 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.857274055 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.857301950 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.857312918 CEST4973111940192.168.2.3191.96.25.26
                                                                          Jun 12, 2021 08:09:52.857343912 CEST1194049731191.96.25.26192.168.2.3
                                                                          Jun 12, 2021 08:09:52.857355118 CEST4973111940192.168.2.3191.96.25.26

                                                                          UDP Packets

                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Jun 12, 2021 08:08:01.074426889 CEST5696153192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:01.136773109 CEST53569618.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:02.388601065 CEST5935353192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:02.440125942 CEST53593538.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:03.754650116 CEST5223853192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:03.808229923 CEST53522388.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:05.060157061 CEST4987353192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:05.110476017 CEST53498738.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:06.462075949 CEST5319653192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:06.520953894 CEST53531968.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:07.770997047 CEST5677753192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:07.826273918 CEST53567778.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:09.045250893 CEST5864353192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:09.096327066 CEST53586438.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:10.177845955 CEST6098553192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:10.228283882 CEST53609858.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:11.472265959 CEST5020053192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:11.524274111 CEST53502008.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:12.718384027 CEST5128153192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:12.771251917 CEST53512818.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:14.064028025 CEST4919953192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:14.118029118 CEST53491998.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:15.772988081 CEST5062053192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:15.832031012 CEST53506208.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:16.893745899 CEST6493853192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:16.948960066 CEST53649388.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:18.108439922 CEST6015253192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:18.161818027 CEST53601528.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:19.307070971 CEST5754453192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:19.357834101 CEST53575448.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:20.863699913 CEST5598453192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:20.913671970 CEST53559848.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:24.887376070 CEST6418553192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:24.890654087 CEST6511053192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:24.947530031 CEST53641858.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:24.953819036 CEST53651108.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:25.409041882 CEST5836153192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:25.470307112 CEST53583618.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:25.595859051 CEST6349253192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:25.659822941 CEST53634928.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:28.110452890 CEST6083153192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:28.172091007 CEST53608318.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:28.403188944 CEST6010053192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:28.467664003 CEST53601008.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:28.884452105 CEST5319553192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:28.978724003 CEST53531958.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:31.299772024 CEST5014153192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:31.324022055 CEST5302353192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:31.359038115 CEST53501418.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:31.384054899 CEST53530238.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:38.726635933 CEST4956353192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:38.787091017 CEST53495638.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:44.617669106 CEST5135253192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:44.679912090 CEST53513528.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:08:54.326776028 CEST5934953192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:08:54.503034115 CEST53593498.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:09:09.557229996 CEST5708453192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:09:09.574312925 CEST5882353192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:09:09.575066090 CEST5756853192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:09:09.607495070 CEST53570848.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:09:09.624795914 CEST53588238.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:09:09.633641005 CEST53575688.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:09:09.961182117 CEST5054053192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:09:10.023971081 CEST53505408.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:09:15.375874996 CEST5436653192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:09:15.551716089 CEST53543668.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:09:33.977591038 CEST5303453192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:09:34.038955927 CEST53530348.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:09:54.043296099 CEST5776253192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:09:54.111274958 CEST53577628.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:09:57.715130091 CEST5543553192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:09:57.793838978 CEST53554358.8.8.8192.168.2.3
                                                                          Jun 12, 2021 08:10:02.387377977 CEST5071353192.168.2.38.8.8.8
                                                                          Jun 12, 2021 08:10:02.450416088 CEST53507138.8.8.8192.168.2.3

                                                                          DNS Queries

                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                          Jun 12, 2021 08:08:28.403188944 CEST192.168.2.38.8.8.80xae51Standard query (0)clientconfig.passport.netA (IP address)IN (0x0001)
                                                                          Jun 12, 2021 08:08:54.326776028 CEST192.168.2.38.8.8.80xdd02Standard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                                          Jun 12, 2021 08:09:15.375874996 CEST192.168.2.38.8.8.80xc79aStandard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                                          Jun 12, 2021 08:09:33.977591038 CEST192.168.2.38.8.8.80x2cccStandard query (0)sys2021.linkpc.netA (IP address)IN (0x0001)
                                                                          Jun 12, 2021 08:09:57.715130091 CEST192.168.2.38.8.8.80xb4eeStandard query (0)mail.jetport-aero.comA (IP address)IN (0x0001)

                                                                          DNS Answers

                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                          Jun 12, 2021 08:08:25.470307112 CEST8.8.8.8192.168.2.30x5e14No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
                                                                          Jun 12, 2021 08:08:28.467664003 CEST8.8.8.8192.168.2.30xae51No error (0)clientconfig.passport.netauthgfx.msa.akadns6.netCNAME (Canonical name)IN (0x0001)
                                                                          Jun 12, 2021 08:08:54.503034115 CEST8.8.8.8192.168.2.30xdd02No error (0)sys2021.linkpc.net52.39.28.134A (IP address)IN (0x0001)
                                                                          Jun 12, 2021 08:09:15.551716089 CEST8.8.8.8192.168.2.30xc79aNo error (0)sys2021.linkpc.net52.39.28.134A (IP address)IN (0x0001)
                                                                          Jun 12, 2021 08:09:34.038955927 CEST8.8.8.8192.168.2.30x2cccNo error (0)sys2021.linkpc.net52.39.28.134A (IP address)IN (0x0001)
                                                                          Jun 12, 2021 08:09:57.793838978 CEST8.8.8.8192.168.2.30xb4eeNo error (0)mail.jetport-aero.comjetport-aero.comCNAME (Canonical name)IN (0x0001)
                                                                          Jun 12, 2021 08:09:57.793838978 CEST8.8.8.8192.168.2.30xb4eeNo error (0)jetport-aero.com217.182.175.206A (IP address)IN (0x0001)

                                                                          SMTP Packets

                                                                          TimestampSource PortDest PortSource IPDest IPCommands
                                                                          Jun 12, 2021 08:09:58.023027897 CEST58749736217.182.175.206192.168.2.3220-ns3819423.ip-217-182-175.eu ESMTP Exim 4.93 #2 Sat, 12 Jun 2021 11:39:58 +0530
                                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                                          220 and/or bulk e-mail.
                                                                          Jun 12, 2021 08:09:58.027066946 CEST49736587192.168.2.3217.182.175.206EHLO 639509
                                                                          Jun 12, 2021 08:09:58.078576088 CEST58749736217.182.175.206192.168.2.3250-ns3819423.ip-217-182-175.eu Hello 639509 [84.17.52.18]
                                                                          250-SIZE 52428800
                                                                          250-8BITMIME
                                                                          250-PIPELINING
                                                                          250-AUTH PLAIN LOGIN
                                                                          250-STARTTLS
                                                                          250 HELP
                                                                          Jun 12, 2021 08:09:58.079933882 CEST49736587192.168.2.3217.182.175.206STARTTLS
                                                                          Jun 12, 2021 08:09:58.133795977 CEST58749736217.182.175.206192.168.2.3220 TLS go ahead
                                                                          Jun 12, 2021 08:09:58.883198977 CEST58749736217.182.175.206192.168.2.3421 Lost incoming connection
                                                                          Jun 12, 2021 08:10:14.266299009 CEST58749744217.182.175.206192.168.2.3220-ns3819423.ip-217-182-175.eu ESMTP Exim 4.93 #2 Sat, 12 Jun 2021 11:40:14 +0530
                                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                                          220 and/or bulk e-mail.
                                                                          Jun 12, 2021 08:10:14.267148972 CEST49744587192.168.2.3217.182.175.206EHLO 639509
                                                                          Jun 12, 2021 08:10:14.320889950 CEST58749744217.182.175.206192.168.2.3250-ns3819423.ip-217-182-175.eu Hello 639509 [84.17.52.18]
                                                                          250-SIZE 52428800
                                                                          250-8BITMIME
                                                                          250-PIPELINING
                                                                          250-AUTH PLAIN LOGIN
                                                                          250-STARTTLS
                                                                          250 HELP
                                                                          Jun 12, 2021 08:10:14.323684931 CEST49744587192.168.2.3217.182.175.206STARTTLS
                                                                          Jun 12, 2021 08:10:14.379235983 CEST58749744217.182.175.206192.168.2.3220 TLS go ahead
                                                                          Jun 12, 2021 08:10:17.940721035 CEST58749744217.182.175.206192.168.2.3421 ns3819423.ip-217-182-175.eu lost input connection
                                                                          Jun 12, 2021 08:10:18.012880087 CEST58749745217.182.175.206192.168.2.3220-ns3819423.ip-217-182-175.eu ESMTP Exim 4.93 #2 Sat, 12 Jun 2021 11:40:18 +0530
                                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                                          220 and/or bulk e-mail.
                                                                          Jun 12, 2021 08:10:18.013842106 CEST49745587192.168.2.3217.182.175.206EHLO 639509
                                                                          Jun 12, 2021 08:10:18.072870970 CEST58749745217.182.175.206192.168.2.3250-ns3819423.ip-217-182-175.eu Hello 639509 [84.17.52.18]
                                                                          250-SIZE 52428800
                                                                          250-8BITMIME
                                                                          250-PIPELINING
                                                                          250-AUTH PLAIN LOGIN
                                                                          250-STARTTLS
                                                                          250 HELP
                                                                          Jun 12, 2021 08:10:18.073750973 CEST49745587192.168.2.3217.182.175.206STARTTLS
                                                                          Jun 12, 2021 08:10:18.127690077 CEST58749745217.182.175.206192.168.2.3220 TLS go ahead
                                                                          Jun 12, 2021 08:10:18.884313107 CEST58749745217.182.175.206192.168.2.3421 ns3819423.ip-217-182-175.eu lost input connection
                                                                          Jun 12, 2021 08:10:18.944071054 CEST58749746217.182.175.206192.168.2.3220-ns3819423.ip-217-182-175.eu ESMTP Exim 4.93 #2 Sat, 12 Jun 2021 11:40:18 +0530
                                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                                          220 and/or bulk e-mail.
                                                                          Jun 12, 2021 08:10:18.944447041 CEST49746587192.168.2.3217.182.175.206EHLO 639509
                                                                          Jun 12, 2021 08:10:18.995879889 CEST58749746217.182.175.206192.168.2.3250-ns3819423.ip-217-182-175.eu Hello 639509 [84.17.52.18]
                                                                          250-SIZE 52428800
                                                                          250-8BITMIME
                                                                          250-PIPELINING
                                                                          250-AUTH PLAIN LOGIN
                                                                          250-STARTTLS
                                                                          250 HELP
                                                                          Jun 12, 2021 08:10:18.996215105 CEST49746587192.168.2.3217.182.175.206STARTTLS
                                                                          Jun 12, 2021 08:10:19.050832033 CEST58749746217.182.175.206192.168.2.3220 TLS go ahead

                                                                          Code Manipulations

                                                                          Statistics

                                                                          Behavior

                                                                          Click to jump to process

                                                                          System Behavior

                                                                          General

                                                                          Start time:08:08:06
                                                                          Start date:12/06/2021
                                                                          Path:C:\Windows\System32\wscript.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Invoice#06-11-2021_PDF.vbs'
                                                                          Imagebase:0x7ff679cd0000
                                                                          File size:163840 bytes
                                                                          MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:08:08:10
                                                                          Start date:12/06/2021
                                                                          Path:C:\Users\user\AppData\Local\Temp\file1.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:'C:\Users\user\AppData\Local\Temp\file1.exe'
                                                                          Imagebase:0x5d0000
                                                                          File size:756224 bytes
                                                                          MD5 hash:07C82C84BAEC92953A270419C72D7F10
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Yara matches:
                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.297937965.0000000003F51000.00000004.00000001.sdmp, Author: Florian Roth
                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.297937965.0000000003F51000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.297937965.0000000003F51000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.307230936.000000000D351000.00000004.00000001.sdmp, Author: Florian Roth
                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.307230936.000000000D351000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.307230936.000000000D351000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                          Antivirus matches:
                                                                          • Detection: 100%, Joe Sandbox ML
                                                                          Reputation:low

                                                                          General

                                                                          Start time:08:08:10
                                                                          Start date:12/06/2021
                                                                          Path:C:\Users\user\AppData\Local\Temp\2name.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:'C:\Users\user\AppData\Local\Temp\2name.exe'
                                                                          Imagebase:0x190000
                                                                          File size:726016 bytes
                                                                          MD5 hash:CF4CD927CCC626FB016D0E91CF6BD456
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.311010210.000000000CDE1000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.311010210.000000000CDE1000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.294907318.00000000038B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.294907318.00000000038B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                          Antivirus matches:
                                                                          • Detection: 100%, Joe Sandbox ML
                                                                          Reputation:low

                                                                          General

                                                                          Start time:08:08:47
                                                                          Start date:12/06/2021
                                                                          Path:C:\Users\user\AppData\Local\Temp\2name.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:{path}
                                                                          Imagebase:0xa30000
                                                                          File size:726016 bytes
                                                                          MD5 hash:CF4CD927CCC626FB016D0E91CF6BD456
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.468518858.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000002.468518858.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.477741518.0000000003301000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.288308557.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000000.288308557.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                          Reputation:low

                                                                          General

                                                                          Start time:08:08:48
                                                                          Start date:12/06/2021
                                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\HHyKJahmIz' /XML 'C:\Users\user\AppData\Local\Temp\tmpC46.tmp'
                                                                          Imagebase:0x930000
                                                                          File size:185856 bytes
                                                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:08:08:49
                                                                          Start date:12/06/2021
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff6b2800000
                                                                          File size:625664 bytes
                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:08:08:49
                                                                          Start date:12/06/2021
                                                                          Path:C:\Users\user\AppData\Local\Temp\file1.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:{path}
                                                                          Imagebase:0xc40000
                                                                          File size:756224 bytes
                                                                          MD5 hash:07C82C84BAEC92953A270419C72D7F10
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.479174515.0000000004334000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000000.291952352.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000000.291952352.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                          • Rule: NanoCore, Description: unknown, Source: 00000015.00000000.291952352.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000002.468642288.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.468642288.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                          • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.468642288.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000002.479905732.0000000005680000.00000004.00000001.sdmp, Author: Florian Roth
                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000015.00000002.479905732.0000000005680000.00000004.00000001.sdmp, Author: Florian Roth
                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000000.292645242.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000000.292645242.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                          • Rule: NanoCore, Description: unknown, Source: 00000015.00000000.292645242.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000002.480599769.0000000005C00000.00000004.00000001.sdmp, Author: Florian Roth
                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000015.00000002.480599769.0000000005C00000.00000004.00000001.sdmp, Author: Florian Roth
                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.480599769.0000000005C00000.00000004.00000001.sdmp, Author: Joe Security
                                                                          Reputation:low

                                                                          Disassembly

                                                                          Code Analysis

                                                                          Reset < >