Loading ...

Play interactive tourEdit tour

Windows Analysis Report R6093846s-Invoice-Receipt.exe

Overview

General Information

Sample Name:R6093846s-Invoice-Receipt.exe
Analysis ID:452642
MD5:cd0645cb78b55f0babbdbc4d51f23bd8
SHA1:f5221832b2b4b7338bc21e42f7e2c983d82dbdf4
SHA256:5b618273e08f4e9633ec359cff551345d0dabf0c64da9d3b5437d1c88c4bd226
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • R6093846s-Invoice-Receipt.exe (PID: 5520 cmdline: 'C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exe' MD5: CD0645CB78B55F0BABBDBC4D51F23BD8)
    • schtasks.exe (PID: 5288 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UALCBPTejUQxQ' /XML 'C:\Users\user\AppData\Local\Temp\tmpCCAD.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5812 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 6204 cmdline: {path} MD5: 2867A3817C9245F7CF518524DFD18F28)
    • RegSvcs.exe (PID: 6232 cmdline: {path} MD5: 2867A3817C9245F7CF518524DFD18F28)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "f8dffc54-5ec5-4013-9de8-d8d85368", "Group": "CODEDBASE", "Domain1": "omaprilcode.duckdns.org", "Domain2": "omaprilcode.duckdns.org", "Port": 8090, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000014.00000002.485019554.0000000006B10000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x5b99:$x1: NanoCore.ClientPluginHost
  • 0x5bb3:$x2: IClientNetworkHost
00000014.00000002.485019554.0000000006B10000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x5b99:$x2: NanoCore.ClientPluginHost
  • 0x6bce:$s4: PipeCreated
  • 0x5b86:$s5: IClientLoggingHost
00000014.00000002.484978078.0000000006AF0000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x59eb:$x1: NanoCore.ClientPluginHost
  • 0x5b48:$x2: IClientNetworkHost
00000014.00000002.484978078.0000000006AF0000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x59eb:$x2: NanoCore.ClientPluginHost
  • 0x6941:$s3: PipeExists
  • 0x5be1:$s4: PipeCreated
  • 0x5a05:$s5: IClientLoggingHost
00000014.00000002.483826250.0000000005440000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xe75:$x1: NanoCore.ClientPluginHost
  • 0xe8f:$x2: IClientNetworkHost
Click to see the 45 entries

Unpacked PEs

SourceRuleDescriptionAuthorStrings
20.2.RegSvcs.exe.6b30000.32.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x170b:$x1: NanoCore.ClientPluginHost
  • 0x1725:$x2: IClientNetworkHost
20.2.RegSvcs.exe.6b30000.32.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x170b:$x2: NanoCore.ClientPluginHost
  • 0x34b6:$s4: PipeCreated
  • 0x16f8:$s5: IClientLoggingHost
20.2.RegSvcs.exe.6190000.23.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x2dbb:$x1: NanoCore.ClientPluginHost
  • 0x2de5:$x2: IClientNetworkHost
20.2.RegSvcs.exe.6190000.23.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x2dbb:$x2: NanoCore.ClientPluginHost
  • 0x4c6b:$s4: PipeCreated
20.2.RegSvcs.exe.6a80000.24.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x6da5:$x1: NanoCore.ClientPluginHost
  • 0x6dd2:$x2: IClientNetworkHost
Click to see the 114 entries

Sigma Overview

AV Detection:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6232, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

E-Banking Fraud:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6232, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Stealing of Sensitive Information:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6232, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Remote Access Functionality:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6232, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Found malware configurationShow sources
Source: 00000014.00000002.479043770.0000000003891000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "f8dffc54-5ec5-4013-9de8-d8d85368", "Group": "CODEDBASE", "Domain1": "omaprilcode.duckdns.org", "Domain2": "omaprilcode.duckdns.org", "Port": 8090, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
Multi AV Scanner detection for domain / URLShow sources
Source: omaprilcode.duckdns.orgVirustotal: Detection: 8%Perma Link
Source: omaprilcode.duckdns.orgVirustotal: Detection: 8%Perma Link
Multi AV Scanner detection for dropped fileShow sources
Source: C:\Users\user\AppData\Roaming\UALCBPTejUQxQ.exeReversingLabs: Detection: 32%
Multi AV Scanner detection for submitted fileShow sources
Source: R6093846s-Invoice-Receipt.exeReversingLabs: Detection: 32%
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 20.2.RegSvcs.exe.5b90000.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448b680.14.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38dff64.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.5b90000.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.432aae0.11.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38dff64.5.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38e458d.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.5b94629.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.432f109.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38db12e.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448b680.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.4325caa.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.420b931.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448fca9.16.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448684a.15.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.432aae0.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.422c192.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.4217b65.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000014.00000002.484104685.0000000005B90000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.470391681.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.479043770.0000000003891000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.480703873.0000000004486000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.305161176.000000000396B000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.474458367.0000000002891000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.480187851.0000000004161000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.304879840.0000000003759000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6232, type: MEMORY
Machine Learning detection for dropped fileShow sources
Source: C:\Users\user\AppData\Roaming\UALCBPTejUQxQ.exeJoe Sandbox ML: detected
Machine Learning detection for sampleShow sources
Source: R6093846s-Invoice-Receipt.exeJoe Sandbox ML: detected
Source: 20.2.RegSvcs.exe.5b90000.20.unpackAvira: Label: TR/NanoCore.fadte
Source: 20.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: R6093846s-Invoice-Receipt.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: R6093846s-Invoice-Receipt.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: RegSvcs.exe, 00000014.00000002.480187851.0000000004161000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Daan\source\repos\NanoExploit\ClientTest\obj\Debug\ClientTest.pdb source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Daan\source\repos\NanoExploit\ClientTest\obj\Debug\ClientTest.pdbS.m. _._CorDllMainmscoree.dll source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49727 -> 185.244.26.194:8090
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49737 -> 185.244.26.194:8090
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49740 -> 185.244.26.194:8090
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49746 -> 185.244.26.194:8090
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49747 -> 185.244.26.194:8090
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49748 -> 185.244.26.194:8090
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49749 -> 185.244.26.194:8090
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49752 -> 185.244.26.194:8090
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49753 -> 185.244.26.194:8090
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49754 -> 185.244.26.194:8090
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49755 -> 185.244.26.194:8090
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49756 -> 185.244.26.194:8090
C2 URLs / IPs found in malware configurationShow sources
Source: Malware configuration extractorURLs: omaprilcode.duckdns.org
Uses dynamic DNS servicesShow sources
Source: unknownDNS query: name: omaprilcode.duckdns.org
Source: global trafficTCP traffic: 192.168.2.3:49727 -> 185.244.26.194:8090
Source: Joe Sandbox ViewASN Name: VAMU-ASIP-TRANSITVAMURU VAMU-ASIP-TRANSITVAMURU
Source: unknownDNS traffic detected: queries for: omaprilcode.duckdns.org
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
Source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmpString found in binary or memory: http://google.com
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.297808598.0000000002751000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

E-Banking Fraud:

barindex
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 20.2.RegSvcs.exe.5b90000.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448b680.14.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38dff64.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.5b90000.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.432aae0.11.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38dff64.5.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38e458d.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.5b94629.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.432f109.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38db12e.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448b680.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.4325caa.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.420b931.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448fca9.16.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448684a.15.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.432aae0.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.422c192.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.4217b65.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000014.00000002.484104685.0000000005B90000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.470391681.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.479043770.0000000003891000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.480703873.0000000004486000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.305161176.000000000396B000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.474458367.0000000002891000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.480187851.0000000004161000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.304879840.0000000003759000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6232, type: MEMORY

System Summary:

barindex
Malicious sample detected (through community Yara rule)Show sources
Source: 20.2.RegSvcs.exe.6b30000.32.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6190000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6a80000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6ac0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.4217b65.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.5b90000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6b10000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6b80000.36.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.448b680.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6b44c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6b00000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.38dff64.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.28be17c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6ac0000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6b40000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6af0000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.5b90000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6b4e8a4.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.432aae0.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.2914cd4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.RegSvcs.exe.6a80000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.RegSvcs.exe.38dff64.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.RegSvcs.exe.38e458d.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.5b94629.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.2914cd4.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6190000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6ad0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6b30000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6af0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6ae0000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6ab0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6ae0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.432f109.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.RegSvcs.exe.6b80000.36.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.38db12e.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.38db12e.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.RegSvcs.exe.6b40000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.448b680.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.RegSvcs.exe.5440000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.6b10000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.420b931.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.2920f1c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.2920f1c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.4325caa.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.RegSvcs.exe.2935558.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.420b931.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.RegSvcs.exe.448fca9.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.RegSvcs.exe.448684a.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.RegSvcs.exe.432aae0.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.RegSvcs.exe.422c192.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.RegSvcs.exe.422c192.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.RegSvcs.exe.4217b65.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000014.00000002.485019554.0000000006B10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000014.00000002.484978078.0000000006AF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000014.00000002.483826250.0000000005440000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000014.00000002.484104685.0000000005B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000014.00000002.485071825.0000000006B30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000014.00000002.470391681.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000014.00000002.470391681.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000014.00000002.484960992.0000000006AE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000014.00000002.479043770.0000000003891000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000014.00000002.484915497.0000000006AC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000014.00000002.484897789.0000000006AB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000014.00000002.485130700.0000000006B80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000014.00000002.480703873.0000000004486000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000014.00000002.484998886.0000000006B00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000014.00000002.484851372.0000000006A80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.305161176.000000000396B000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.305161176.000000000396B000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000014.00000002.485085026.0000000006B40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000014.00000002.484936957.0000000006AD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000014.00000002.480187851.0000000004161000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000014.00000002.484499149.0000000006190000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.304879840.0000000003759000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.304879840.0000000003759000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: RegSvcs.exe PID: 6232, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: RegSvcs.exe PID: 6232, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Initial sample is a PE file and has a suspicious nameShow sources
Source: initial sampleStatic PE information: Filename: R6093846s-Invoice-Receipt.exe
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_026F2293
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_026F0473
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_026F1060
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_026F30B8
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_026F18D9
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_026F5898
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_026F4BA8
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_026F4BB8
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_026F5220
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_026F5230
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_026F321C
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_026F3329
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_026F56C8
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_026F5438
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_026F3572
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_061902B0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_0276E471
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_0276E480
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_0276BBD4
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_06BA2528
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_06BAA238
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_06BAAB08
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_06BA0040
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_06BA31F0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_06BA9EF0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_06BA32AE
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_06BAEA38
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_06BA00FE
Source: R6093846s-Invoice-Receipt.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: UALCBPTejUQxQ.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.298299117.00000000027C5000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs R6093846s-Invoice-Receipt.exe
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.301265309.0000000002A2D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameResource_Meter.dll> vs R6093846s-Invoice-Receipt.exe
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.307501982.0000000004C90000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs R6093846s-Invoice-Receipt.exe
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.295355680.00000000003DB000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamey34nz.exe2 vs R6093846s-Invoice-Receipt.exe
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.309371083.0000000005E10000.00000002.00000001.sdmpBinary or memory string: originalfilename vs R6093846s-Invoice-Receipt.exe
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.309371083.0000000005E10000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs R6093846s-Invoice-Receipt.exe
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.308198887.00000000052A0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs R6093846s-Invoice-Receipt.exe
Source: R6093846s-Invoice-Receipt.exeBinary or memory string: OriginalFilenamey34nz.exe2 vs R6093846s-Invoice-Receipt.exe
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeSection loaded: onecoreuapcommonproxystub.dll
Source: R6093846s-Invoice-Receipt.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: 20.2.RegSvcs.exe.6b30000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6b30000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6190000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6190000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6a80000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6a80000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6ac0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6ac0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.4217b65.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.4217b65.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.5b90000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.5b90000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6b10000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6b10000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6b80000.36.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6b80000.36.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.448b680.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.448b680.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6b44c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6b44c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6b00000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6b00000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.38dff64.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.38dff64.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.28be17c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.28be17c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6ac0000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6ac0000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6b40000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6b40000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6af0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6af0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.5b90000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.5b90000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6b4e8a4.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6b4e8a4.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.432aae0.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.432aae0.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.2914cd4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.RegSvcs.exe.6a80000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6a80000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.RegSvcs.exe.38dff64.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.38dff64.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.RegSvcs.exe.38e458d.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.38e458d.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.5b94629.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.5b94629.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.2914cd4.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.2914cd4.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6190000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6190000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6ad0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6ad0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6b30000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6b30000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6af0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6af0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6ae0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6ae0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6ab0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6ab0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6ae0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6ae0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.432f109.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.RegSvcs.exe.6b80000.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6b80000.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.38db12e.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.38db12e.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.38db12e.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.RegSvcs.exe.6b40000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6b40000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.448b680.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.RegSvcs.exe.5440000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.5440000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.6b10000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.6b10000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.420b931.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.420b931.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.2920f1c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.2920f1c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.RegSvcs.exe.2920f1c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.4325caa.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.RegSvcs.exe.2935558.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.420b931.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.RegSvcs.exe.448fca9.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.RegSvcs.exe.448684a.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.RegSvcs.exe.432aae0.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.RegSvcs.exe.422c192.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.RegSvcs.exe.422c192.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.RegSvcs.exe.4217b65.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000014.00000002.485019554.0000000006B10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.485019554.0000000006B10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000014.00000002.484978078.0000000006AF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.484978078.0000000006AF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000014.00000002.483826250.0000000005440000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.483826250.0000000005440000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000014.00000002.484104685.0000000005B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.484104685.0000000005B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000014.00000002.485071825.0000000006B30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.485071825.0000000006B30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000014.00000002.470391681.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.470391681.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000014.00000002.484960992.0000000006AE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.484960992.0000000006AE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000014.00000002.479043770.0000000003891000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000014.00000002.484915497.0000000006AC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.484915497.0000000006AC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000014.00000002.484897789.0000000006AB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.484897789.0000000006AB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000014.00000002.485130700.0000000006B80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.485130700.0000000006B80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000014.00000002.480703873.0000000004486000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000014.00000002.484998886.0000000006B00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.484998886.0000000006B00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000014.00000002.484851372.0000000006A80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.484851372.0000000006A80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000000.00000002.305161176.000000000396B000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000000.00000002.305161176.000000000396B000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000014.00000002.485085026.0000000006B40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.485085026.0000000006B40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000014.00000002.484936957.0000000006AD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.484936957.0000000006AD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000014.00000002.480187851.0000000004161000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000014.00000002.484499149.0000000006190000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.484499149.0000000006190000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000000.00000002.304879840.0000000003759000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000000.00000002.304879840.0000000003759000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: RegSvcs.exe PID: 6232, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: RegSvcs.exe PID: 6232, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: R6093846s-Invoice-Receipt.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: UALCBPTejUQxQ.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: 20.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 20.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 20.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: classification engineClassification label: mal100.troj.evad.winEXE@8/8@12/2
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeFile created: C:\Users\user\AppData\Roaming\UALCBPTejUQxQ.exeJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5812:120:WilError_01
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{f8dffc54-5ec5-4013-9de8-d8d853682f44}
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeMutant created: \Sessions\1\BaseNamedObjects\SjaOvCuaUGvC
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeFile created: C:\Users\user\AppData\Local\Temp\tmpCCAD.tmpJump to behavior
Source: R6093846s-Invoice-Receipt.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: R6093846s-Invoice-Receipt.exeReversingLabs: Detection: 32%
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeFile read: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exe 'C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exe'
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UALCBPTejUQxQ' /XML 'C:\Users\user\AppData\Local\Temp\tmpCCAD.tmp'
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UALCBPTejUQxQ' /XML 'C:\Users\user\AppData\Local\Temp\tmpCCAD.tmp'
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
Source: R6093846s-Invoice-Receipt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: R6093846s-Invoice-Receipt.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: RegSvcs.exe, 00000014.00000002.480187851.0000000004161000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Daan\source\repos\NanoExploit\ClientTest\obj\Debug\ClientTest.pdb source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Daan\source\repos\NanoExploit\ClientTest\obj\Debug\ClientTest.pdbS.m. _._CorDllMainmscoree.dll source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp

Data Obfuscation:

barindex
.NET source code contains potential unpackerShow sources
Source: R6093846s-Invoice-Receipt.exe, uNotepad/Form1.cs.Net Code: TGBNJUYHFDERWS System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: UALCBPTejUQxQ.exe.0.dr, uNotepad/Form1.cs.Net Code: TGBNJUYHFDERWS System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 0.0.R6093846s-Invoice-Receipt.exe.300000.0.unpack, uNotepad/Form1.cs.Net Code: TGBNJUYHFDERWS System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 0.2.R6093846s-Invoice-Receipt.exe.300000.0.unpack, uNotepad/Form1.cs.Net Code: TGBNJUYHFDERWS System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 20.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 20.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_0036A1F1 push 00000020h; iretd
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeCode function: 0_2_0036B9CD pushfd ; iretd
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_06BA0EB0 push eax; retf
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_06BA1F20 push es; ret
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_06BA1F00 push es; ret
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_06BA1F40 push es; ret
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_06BAC421 push es; ret
Source: initial sampleStatic PE information: section name: .text entropy: 7.77156503233
Source: initial sampleStatic PE information: section name: .text entropy: 7.77156503233
Source: 20.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 20.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeFile created: C:\Users\user\AppData\Roaming\UALCBPTejUQxQ.exeJump to dropped file

Boot Survival:

barindex
Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UALCBPTejUQxQ' /XML 'C:\Users\user\AppData\Local\Temp\tmpCCAD.tmp'

Hooking and other Techniques for Hiding and Protection:

barindex
Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe:Zone.Identifier read attributes | delete
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.297808598.0000000002751000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.297808598.0000000002751000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3307
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6036
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: foregroundWindowGot 513
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: foregroundWindowGot 612
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exe TID: 3512Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exe TID: 6240Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.297808598.0000000002751000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
Source: RegSvcs.exe, 00000014.00000002.485282482.0000000006EE0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.297808598.0000000002751000.00000004.00000001.sdmpBinary or memory string: vmware
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.297808598.0000000002751000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.297808598.0000000002751000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.297808598.0000000002751000.00000004.00000001.sdmpBinary or memory string: VMWARE
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.297808598.0000000002751000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: RegSvcs.exe, 00000014.00000002.485282482.0000000006EE0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: RegSvcs.exe, 00000014.00000002.485282482.0000000006EE0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.297808598.0000000002751000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.297808598.0000000002751000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.297808598.0000000002751000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
Source: RegSvcs.exe, 00000014.00000002.472769599.0000000000CAF000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: RegSvcs.exe, 00000014.00000002.485282482.0000000006EE0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeMemory allocated: page read and write | page guard

HIPS / PFW / Operating System Protection Evasion:

barindex
Injects a PE file into a foreign processesShow sources
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
Writes to foreign memory regionsShow sources
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 420000
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 422000
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 719008
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UALCBPTejUQxQ' /XML 'C:\Users\user\AppData\Local\Temp\tmpCCAD.tmp'
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
Source: RegSvcs.exe, 00000014.00000002.484719382.00000000067AC000.00000004.00000001.sdmpBinary or memory string: Program Manager(
Source: RegSvcs.exe, 00000014.00000002.478278857.0000000002E2A000.00000004.00000001.sdmpBinary or memory string: Program Manager
Source: RegSvcs.exe, 00000014.00000002.473700881.00000000012C0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: RegSvcs.exe, 00000014.00000002.484152384.0000000005CEC000.00000004.00000001.sdmpBinary or memory string: Program Manager|<
Source: RegSvcs.exe, 00000014.00000002.484659379.000000000656C000.00000004.00000001.sdmpBinary or memory string: Program Manager|\
Source: RegSvcs.exe, 00000014.00000002.472879368.0000000000DCE000.00000004.00000001.sdmpBinary or memory string: Program Manager"
Source: RegSvcs.exe, 00000014.00000002.473700881.00000000012C0000.00000002.00000001.sdmpBinary or memory string: Progman
Source: RegSvcs.exe, 00000014.00000002.484443464.000000000604B000.00000004.00000001.sdmpBinary or memory string: Program Manager||
Source: RegSvcs.exe, 00000014.00000002.485937374.000000000883E000.00000004.00000001.sdmpBinary or memory string: Program Managerram Manager
Source: RegSvcs.exe, 00000014.00000002.484770050.0000000006A6C000.00000004.00000001.sdmpBinary or memory string: Program Managerram ManagerP
Source: RegSvcs.exe, 00000014.00000002.474705319.0000000002A0C000.00000004.00000001.sdmpBinary or memory string: Program Manager|$
Source: RegSvcs.exe, 00000014.00000002.474705319.0000000002A0C000.00000004.00000001.sdmpBinary or memory string: Program Managerx
Source: RegSvcs.exe, 00000014.00000002.473700881.00000000012C0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
Source: RegSvcs.exe, 00000014.00000002.474528779.00000000028FD000.00000004.00000001.sdmpBinary or memory string: Program Managert
Source: RegSvcs.exe, 00000014.00000002.485957024.000000000897B000.00000004.00000001.sdmpBinary or memory string: Program Manager
Source: RegSvcs.exe, 00000014.00000002.485880655.00000000084BB000.00000004.00000001.sdmpBinary or memory string: Program Managerram Manager|
Source: RegSvcs.exe, 00000014.00000002.485893815.00000000085BE000.00000004.00000001.sdmpBinary or memory string: Program Manager|
Source: RegSvcs.exe, 00000014.00000002.473597627.0000000000F2E000.00000004.00000001.sdmpBinary or memory string: Program Manager x
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exe VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_06BA11A0 GetSystemTimes,
Source: C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

Stealing of Sensitive Information:

barindex
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 20.2.RegSvcs.exe.5b90000.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448b680.14.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38dff64.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.5b90000.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.432aae0.11.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38dff64.5.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38e458d.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.5b94629.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.432f109.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38db12e.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448b680.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.4325caa.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.420b931.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448fca9.16.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448684a.15.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.432aae0.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.422c192.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.4217b65.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000014.00000002.484104685.0000000005B90000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.470391681.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.479043770.0000000003891000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.480703873.0000000004486000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.305161176.000000000396B000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.474458367.0000000002891000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.480187851.0000000004161000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.304879840.0000000003759000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6232, type: MEMORY

Remote Access Functionality:

barindex
Detected Nanocore RatShow sources
Source: R6093846s-Invoice-Receipt.exe, 00000000.00000002.305161176.000000000396B000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: RegSvcs.exeString found in binary or memory: NanoCore.ClientPluginHost
Source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: RegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmpString found in binary or memory: <Module>System.IOvalue__mscorlibConnectionStateChangedConnectionFailedPipeClosedPipeCreatedconnected<DataHost>k__BackingField<LoggingHost>k__BackingField<NetworkHost>k__BackingFieldBuildingHostCacheDownloadFileset_WindowStyleProcessWindowStyleset_FileNameGetFileNamepipeNameCreatePipeCommandTypeDebuggerBrowsableStateCompilerGeneratedAttributeGuidAttributeDebuggableAttributeDebuggerBrowsableAttributeComVisibleAttributeAssemblyTitleAttributeAssemblyTrademarkAttributeAssemblyFileVersionAttributeAssemblyConfigurationAttributeAssemblyDescriptionAttributeCompilationRelaxationsAttributeAssemblyProductAttributeAssemblyCopyrightAttributeAssemblyCompanyAttributeRuntimeCompatibilityAttributeDownloadExecutevalueStringPathIClientNetworkDownloadExecuteInternalClientTest.dllSystemEnumNanoCore.ClientPluginSystem.ReflectionExceptionFileInfoFileSystemInfoProcessStartInfo.ctorSystem.DiagnosticsSystem.Runtime.InteropServicesSystem.Runtime.CompilerServicesDebuggingModesGetVariablesget_Attributesset_AttributesFileAttributesGetBuilderSettingsGetServerSettingsparamsGetConnectionsProcessInfectClientsObjectSystem.NetReadPacketWebClientStartportServerTestClientTestget_DataHostset_DataHostIClientDataHost_dataHostget_LoggingHostset_LoggingHostIClientLoggingHost_loggingHostget_NetworkHostset_NetworkHostIClientNetworkHost_networkHostNanoCore.ClientPluginHosthostset_CreateNoWindow?
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 20.2.RegSvcs.exe.5b90000.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448b680.14.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38dff64.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.5b90000.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.432aae0.11.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.R6093846s-Invoice-Receipt.exe.385f080.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38dff64.5.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38e458d.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.5b94629.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.432f109.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.38db12e.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448b680.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.4325caa.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.420b931.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448fca9.16.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.448684a.15.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.432aae0.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.422c192.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.RegSvcs.exe.4217b65.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000014.00000002.484104685.0000000005B90000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.470391681.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.479043770.0000000003891000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.480703873.0000000004486000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.305161176.000000000396B000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.474458367.0000000002891000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.480187851.0000000004161000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.304879840.0000000003759000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6232, type: MEMORY

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation1DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools1Input Capture11System Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection212Deobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Obfuscated Files or Information3Security Account ManagerSystem Information Discovery13SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing13NTDSQuery Registry1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDLL Side-Loading1LSA SecretsSecurity Software Discovery211SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion21DCSyncVirtualization/Sandbox Evasion21Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection212Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
R6093846s-Invoice-Receipt.exe33%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
R6093846s-Invoice-Receipt.exe100%Joe Sandbox ML

Dropped Files

SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\UALCBPTejUQxQ.exe100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\UALCBPTejUQxQ.exe33%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
20.2.RegSvcs.exe.5b90000.20.unpack100%AviraTR/NanoCore.fadteDownload File
20.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

Domains

SourceDetectionScannerLabelLink
omaprilcode.duckdns.org9%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
omaprilcode.duckdns.org9%VirustotalBrowse
omaprilcode.duckdns.org0%Avira URL Cloudsafe
http://www.tiro.com0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
omaprilcode.duckdns.org
185.244.26.194
truetrueunknown

Contacted URLs

NameMaliciousAntivirus DetectionReputation
omaprilcode.duckdns.orgtrue
  • 9%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://www.apache.org/licenses/LICENSE-2.0R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
    high
    http://www.fontbureau.comR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
      high
      http://www.fontbureau.com/designersGR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
        high
        http://www.fontbureau.com/designers/?R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
          high
          http://www.founder.com.cn/cn/bTheR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designers?R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
            high
            http://www.tiro.comR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designersR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
              high
              http://www.goodfont.co.krR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://google.comRegSvcs.exe, 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmpfalse
                high
                http://www.carterandcone.comlR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.sajatypeworks.comR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.typography.netDR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers/cabarga.htmlNR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/cTheR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.galapagosdesign.com/staff/dennis.htmR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://fontfabrik.comR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cnR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/frere-jones.htmlR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                    high
                    http://www.jiyu-kobo.co.jp/R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/DPleaseR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers8R6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                      high
                      http://www.fonts.comR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                        high
                        http://www.sandoll.co.krR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.deDPleaseR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cnR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameR6093846s-Invoice-Receipt.exe, 00000000.00000002.297808598.0000000002751000.00000004.00000001.sdmpfalse
                          high
                          http://www.sakkal.comR6093846s-Invoice-Receipt.exe, 00000000.00000002.318334259.000000000BCB2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          185.244.26.194
                          omaprilcode.duckdns.orgNetherlands
                          47158VAMU-ASIP-TRANSITVAMURUtrue

                          Private

                          IP
                          192.168.2.1

                          General Information

                          Joe Sandbox Version:33.0.0 White Diamond
                          Analysis ID:452642
                          Start date:22.07.2021
                          Start time:17:14:21
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 10m 24s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:R6093846s-Invoice-Receipt.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:31
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@8/8@12/2
                          EGA Information:Failed
                          HDC Information:
                          • Successful, ratio: 1.7% (good quality ratio 1.2%)
                          • Quality average: 49.6%
                          • Quality standard deviation: 36.4%
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .exe
                          Warnings:
                          Show All
                          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                          • TCP Packets have been reduced to 100
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 104.42.151.234, 23.211.6.115, 20.82.209.104, 23.211.4.86, 52.147.198.201, 40.88.32.150, 20.54.110.249, 173.222.108.210, 173.222.108.226, 40.112.88.60, 80.67.82.211, 80.67.82.235, 20.82.210.154
                          • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, iris-de-ppe-azsc-neu.northeurope.cloudapp.azure.com, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          17:15:49API Interceptor1x Sleep call for process: R6093846s-Invoice-Receipt.exe modified
                          17:15:55API Interceptor656x Sleep call for process: RegSvcs.exe modified

                          Joe Sandbox View / Context

                          IPs

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          185.244.26.194DHL STATEMENT OF ACCOUNT.exeGet hashmaliciousBrowse

                            Domains

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            omaprilcode.duckdns.orgANNA-INVOICE-4725434.EXEGet hashmaliciousBrowse
                            • 79.134.225.6
                            Victoria-Invoice-62541323.exeGet hashmaliciousBrowse
                            • 79.134.225.6
                            Aurora-Invoice-9383736.exeGet hashmaliciousBrowse
                            • 79.134.225.6
                            Madison-Invoice-6220917.exeGet hashmaliciousBrowse
                            • 79.134.225.6
                            4N92zkeMjL.exeGet hashmaliciousBrowse
                            • 185.244.26.199
                            V31802166Invoice.exeGet hashmaliciousBrowse
                            • 185.244.26.199
                            CgzObSR6MI.exeGet hashmaliciousBrowse
                            • 79.134.225.9
                            dautkyNrlD.exeGet hashmaliciousBrowse
                            • 79.134.225.9
                            H538065217Invoice.exeGet hashmaliciousBrowse
                            • 79.134.225.9
                            v4nJnRl1gt.exeGet hashmaliciousBrowse
                            • 79.134.225.9
                            524241363INV0ICE.exeGet hashmaliciousBrowse
                            • 194.5.97.75
                            y3t4g48gj6_PAYMENT.exeGet hashmaliciousBrowse
                            • 194.5.97.75
                            y3t4g48gj6_PAYMENT.exeGet hashmaliciousBrowse
                            • 194.5.97.75
                            IPUt7Nr2CH.exeGet hashmaliciousBrowse
                            • 194.5.97.75
                            q19CDiK5TD.exeGet hashmaliciousBrowse
                            • 194.5.97.75

                            ASN

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            VAMU-ASIP-TRANSITVAMURUSwift_Fattura_0093320128_.exeGet hashmaliciousBrowse
                            • 185.244.26.218
                            cargo detail.vbsGet hashmaliciousBrowse
                            • 185.244.26.213
                            MFN0QBsVmm.exeGet hashmaliciousBrowse
                            • 185.244.26.199
                            Purchase#Order20880.pdf.exeGet hashmaliciousBrowse
                            • 185.244.26.198
                            Beatrice-Invoice-94873.exeGet hashmaliciousBrowse
                            • 185.244.26.199
                            EVOREC - PO FH87565635456,pdf.exeGet hashmaliciousBrowse
                            • 185.244.26.196
                            Pay014_Screenshot.exeGet hashmaliciousBrowse
                            • 185.244.26.199
                            OIT-999-0021-21-00.vbsGet hashmaliciousBrowse
                            • 185.244.26.213
                            4N92zkeMjL.exeGet hashmaliciousBrowse
                            • 185.244.26.199
                            V31802166Invoice.exeGet hashmaliciousBrowse
                            • 185.244.26.199
                            jq9H4Yk8Uy.exeGet hashmaliciousBrowse
                            • 185.244.26.233
                            Agency instructions.exeGet hashmaliciousBrowse
                            • 185.244.26.244
                            ACS Leasing ACMI Details.vbsGet hashmaliciousBrowse
                            • 185.244.26.187
                            TNT AWB TRACKING DETAILS.exeGet hashmaliciousBrowse
                            • 185.244.26.237
                            FIR.SCR.exeGet hashmaliciousBrowse
                            • 185.244.26.199
                            Payment_Advice_Summary_06102021.vbsGet hashmaliciousBrowse
                            • 185.244.26.242
                            fac.jarGet hashmaliciousBrowse
                            • 185.244.26.223
                            PaymentDetails.exeGet hashmaliciousBrowse
                            • 185.244.26.234
                            fature.jarGet hashmaliciousBrowse
                            • 185.244.26.223
                            May 31st, ROSI-AOP Incident Report Details.vbsGet hashmaliciousBrowse
                            • 185.244.26.202

                            JA3 Fingerprints

                            No context

                            Dropped Files

                            No context

                            Created / dropped Files

                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\R6093846s-Invoice-Receipt.exe.log
                            Process:C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.355304211458859
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                            MD5:FED34146BF2F2FA59DCF8702FCC8232E
                            SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                            SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                            SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                            Malicious:true
                            Reputation:high, very likely benign file
                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                            C:\Users\user\AppData\Local\Temp\tmpCCAD.tmp
                            Process:C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1646
                            Entropy (8bit):5.201350821712482
                            Encrypted:false
                            SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGmOtn:cbh47TlNQ//rydbz9I3YODOLNdq38J
                            MD5:10825A068F66AFA5B707A7B3CDAB7FFF
                            SHA1:2DD947530450B2144FA27C0947F8A3CC1088E075
                            SHA-256:AF1419ABF53B8CC7904C4909ACB750191BC45C248C266D22EB3C542F3D8B9C5B
                            SHA-512:652A2A58803070C30F2F88610889858EC1ECF50099CF627345A97AB80AB66004F08D9B5B5F3AEF62954997332F793E4043C33E260B50F74B808D5C91BC03D44C
                            Malicious:true
                            Reputation:low
                            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1624
                            Entropy (8bit):7.109925499344649
                            Encrypted:false
                            SSDEEP:48:IkXEUg6ikXEUg6ikXEUg6ikXEUg6ikXEUg6ikXEUg6ikXEUg6Z:06y6y6y6y6y6y6Z
                            MD5:DF9DF69B9BDF9E9F14ACBA7F6AAA0439
                            SHA1:F69C499EA98CB3B3FC303A8C19017F150D2FDAA1
                            SHA-256:172CAF6D0566CCDAD43210FC178D55B2D12F18070F4978B27AFBE2EECB904239
                            SHA-512:CBC09050EECA7053F9EE7E1E744155F2E3A7A9571C06C773B1BD7FFCCC0D2572957EDB57BBC7AD2E37C180D9CB34E306EF32CE417530386FBCC5921600E7F3C0
                            Malicious:false
                            Reputation:low
                            Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....`*kZ..JR<..e.8....z...O......f..m.PQ>Y...}.....K.,Kl..G.....qA..#.w.&..7m..B.I.....in..<5J....z).H?....6..*2Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....`*kZ..JR<..e.8....z...O......f..m.PQ>Y...}.....K.,Kl..G.....qA..#.w.&..7m..B.I.....in..<5J....z).H?....6..*2Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....`*kZ..JR<..e.8....z...O......f..m.PQ>Y...}.....K.,Kl..G.....qA..#.w.&..7m..B.I.....in..<5J....z).H?....6..*2Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....`*kZ..JR<..e.8....z...O......f..m.PQ>Y...}.....K.,Kl..G.....qA..#.w.&..7m..B.I.....in..<5J....z).H?....6..*2Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            File Type:ISO-8859 text, with no line terminators
                            Category:dropped
                            Size (bytes):8
                            Entropy (8bit):3.0
                            Encrypted:false
                            SSDEEP:3:Pno8:vo8
                            MD5:87A19E60362ADB0A4C4DEDA315D07F62
                            SHA1:6340BAD06709D73A2D2946AC49CB5FC77B1E4DA7
                            SHA-256:548F2F89D08DD063284AA4FEA0BE342B4BF8C1516613EA3DC945C294DE8816D8
                            SHA-512:F2EF91AEEC6851000DB7A05D7B678BE6C5A15712D0684165D2665A135F3D4FCAF348934946F1F1766F5DA14E4613AA115D713685B243E12C30B125FCE47462F6
                            Malicious:true
                            Reputation:low
                            Preview: ?!..oM.H
                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bak
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):24
                            Entropy (8bit):4.501629167387823
                            Encrypted:false
                            SSDEEP:3:9bzY6oRDIvYk:RzWDI3
                            MD5:ACD3FB4310417DC77FE06F15B0E353E6
                            SHA1:80E7002E655EB5765FDEB21114295CB96AD9D5EB
                            SHA-256:DC3AE604991C9BB8FF8BC4502AE3D0DB8A3317512C0F432490B103B89C1A4368
                            SHA-512:DA46A917DB6276CD4528CFE4AD113292D873CA2EBE53414730F442B83502E5FAF3D1AE87BFA295ADF01E3B44FDBCE239E21A318BFB2CCD1F4753846CB21F6F97
                            Malicious:false
                            Preview: 9iH...}Z.4..f..J".C;"a
                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):64
                            Entropy (8bit):5.320159765557392
                            Encrypted:false
                            SSDEEP:3:9bzY6oRDIvYVsRLY6oRDT6P2bfVn1:RzWDIfRWDT621
                            MD5:BB0F9B9992809E733EFFF8B0E562CFD6
                            SHA1:F0BAB3CF73A04F5A689E6AFC764FEE9276992742
                            SHA-256:C48F04FE7525AA3A3F9540889883F649726233DE021724823720A59B4F37CEAC
                            SHA-512:AE4280AA460DC1C0301D458A3A443F6884A0BE37481737B2ADAFD72C33C55F09BED88ED239C91FE6F19CA137AC3CD7C9B8454C21D3F8E759687F701C8B3C7A16
                            Malicious:false
                            Preview: 9iH...}Z.4..f..J".C;"a9iH...}Z.4..f.~a........~.~.......3.U.
                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):317088
                            Entropy (8bit):7.999536411743182
                            Encrypted:true
                            SSDEEP:6144:cSSJh0WiGAFfbnrQk7EJa7yflloAWFNriVBkZCCsF:QhgZJ7yfToAyiz3F
                            MD5:6AB7A5BD77B3380B3DAC6164123D58C8
                            SHA1:1732E82902857F97E49541719EA46CFB88FCA68B
                            SHA-256:B89A2604B568E5D5435CE1885752739E481E83C08063DEA8FBC5CF271C0BA6D7
                            SHA-512:DDCF3CBD63D43A0E4115E77DA62D6E94199EBB1CE836A69ADBC1CA3DB6AB0D3CDFC7EC1BD495AB93286CC52223F371ED60D36BC25547E79901CD8751B10D97CC
                            Malicious:false
                            Preview: z.L*Y9.7.X..~Y...q..0y....5.1e+6..d;..........i......pk...&u..x.W1_.B.....ZP.............n...@u.uC8.o...ZX:K.C..E.S..pm.a....$..........0=H...@....n..AFi..F...H\..d..,..R@....c.{.$.@....:..>.}W..IN......PN(.._.\..~.Z........N..8:i.9.7.`.s.<.IX."?....{Mi..o.....M*...#]...!L .Ua_.7..D.XB.a;MP......a..?.RQ..ni..i..z...h..R.VW^7^.i.......T/..eh.......?.j.....H..~...X.I%..8..tP...(.t>H+.s.t.w..(. ..v..!.q1+C.Z.z.vgx.'4..C..!.x.Ez.-..FR.........E..A$L.....=.Q[..)_.5c..E.~s#.{........."...a:...&:.Ye......xu.V..v%;...FT0*..0.e...n.ss.. .,....%....0...iI.."......ira8..../.Wi.+[\....1.8......t(.\,.$b.*z...,_..;.....M/=...}.?......%....C<v+o...W.v..Q..H.zh).@n]....!uBY.<y9......]..fX..:(?.3..0....$.< "-.....f.m.j.+#.d7Xf.y.-C.......94}..a..S>....~)..%...?.......Wl.'.hNf..UW.H.Qu.{Ns.-.....m".I.....aB4.%"......>.e.d.7...b'.I........_{..9....'.!s..P.g].e.lL).0~.V..!..\y.'..hp.u6....n.*.w.}.........P0......3%..*=X]...`j...1.{<....NM.}t.."...'..`.U.{.
                            C:\Users\user\AppData\Roaming\UALCBPTejUQxQ.exe
                            Process:C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):896000
                            Entropy (8bit):7.28733637902053
                            Encrypted:false
                            SSDEEP:12288:uhdsjoEa0P0ug8+KpRJIwOauaExsH+XViPUN9AuTcxNzVD7+xQipP5r:2dsjT/zga3Ju7a+S+XViPUNiuY7Ripp
                            MD5:CD0645CB78B55F0BABBDBC4D51F23BD8
                            SHA1:F5221832B2B4B7338BC21E42F7E2C983D82DBDF4
                            SHA-256:5B618273E08F4E9633EC359CFF551345D0DABF0C64DA9D3B5437D1C88C4BD226
                            SHA-512:C2B8D05C73AB852FD4C425076E26F6D00F0A192D722B526809C6EFC5DF4623B445B5784D1C9E94DBE5EA84D7B5777451842EB898E5470422AA5AB362A369710D
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 33%
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....c.`..............0.............N.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...T.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................0.......H........G..t...........................................................O .....W .3z...J...<hC.~...........H.`..z...,......$.q.L.$..T..S...wsQ.IN[..jx....^3.w.......w.kB+.r....6-...(...Qp;.<f....&.S.U.a2...*f..f...............,..f="....|..V...L..v9....O.grP.A..5...a........J.h..T..+..#._..u...u .{.$..Y.....'.B..6,.c....s.......E8..w..3. .1..D.oU3=.j...._.-&.7-..l..........H..7)..kL....G....V.........0.u.....V.^.Rk.....|.:..+...b^.k..+.]..../..q....

                            Static File Info

                            General

                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.28733637902053
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            • DOS Executable Generic (2002/1) 0.01%
                            File name:R6093846s-Invoice-Receipt.exe
                            File size:896000
                            MD5:cd0645cb78b55f0babbdbc4d51f23bd8
                            SHA1:f5221832b2b4b7338bc21e42f7e2c983d82dbdf4
                            SHA256:5b618273e08f4e9633ec359cff551345d0dabf0c64da9d3b5437d1c88c4bd226
                            SHA512:c2b8d05c73ab852fd4c425076e26f6d00f0a192d722b526809c6efc5df4623b445b5784d1c9e94dbe5ea84d7b5777451842eb898e5470422aa5ab362a369710d
                            SSDEEP:12288:uhdsjoEa0P0ug8+KpRJIwOauaExsH+XViPUN9AuTcxNzVD7+xQipP5r:2dsjT/zga3Ju7a+S+XViPUNiuY7Ripp
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....c.`..............0.............N.... ........@.. ....................................@................................

                            File Icon

                            Icon Hash:1a72e2e4747a6662

                            Static PE Info

                            General

                            Entrypoint:0x48f84e
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                            Time Stamp:0x60F96389 [Thu Jul 22 12:24:41 2021 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:v4.0.30319
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                            Entrypoint Preview

                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al

                            Data Directories

                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x8f7fc0x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x900000x4cca8.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                            Sections

                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x8d8540x8da00False0.869911187114data7.77156503233IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                            .rsrc0x900000x4cca80x4ce00False0.181107088415data5.87991492368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0xde0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                            Resources

                            NameRVASizeTypeLanguageCountry
                            RT_ICON0x902500x468GLS_BINARY_LSB_FIRST
                            RT_ICON0x906b80x988data
                            RT_ICON0x910400x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 54805568, next used block 54805568
                            RT_ICON0x920e80x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 54805568, next used block 21251136
                            RT_ICON0x946900x3511PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                            RT_ICON0x97ba40x44028data
                            RT_GROUP_ICON0xdbbcc0x4cdata
                            RT_GROUP_ICON0xdbc180x5adata
                            RT_VERSION0xdbc740x30cdata
                            RT_MANIFEST0xdbf800xd25XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators

                            Imports

                            DLLImport
                            mscoree.dll_CorExeMain

                            Version Infos

                            DescriptionData
                            Translation0x0000 0x04b0
                            LegalCopyrightCopyright 2016
                            Assembly Version1.0.0.0
                            InternalNamey34nz.exe
                            FileVersion1.0.0.0
                            CompanyName
                            LegalTrademarks
                            Comments
                            ProductNameuNotepad
                            ProductVersion1.0.0.0
                            FileDescriptionuNotepad
                            OriginalFilenamey34nz.exe

                            Network Behavior

                            Snort IDS Alerts

                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            07/22/21-17:15:57.652962TCP2025019ET TROJAN Possible NanoCore C2 60B497278090192.168.2.3185.244.26.194
                            07/22/21-17:16:07.297979TCP2025019ET TROJAN Possible NanoCore C2 60B497378090192.168.2.3185.244.26.194
                            07/22/21-17:16:13.534653TCP2025019ET TROJAN Possible NanoCore C2 60B497408090192.168.2.3185.244.26.194
                            07/22/21-17:16:22.015102TCP2025019ET TROJAN Possible NanoCore C2 60B497468090192.168.2.3185.244.26.194
                            07/22/21-17:16:29.006113TCP2025019ET TROJAN Possible NanoCore C2 60B497478090192.168.2.3185.244.26.194
                            07/22/21-17:16:35.941770TCP2025019ET TROJAN Possible NanoCore C2 60B497488090192.168.2.3185.244.26.194
                            07/22/21-17:16:43.040140TCP2025019ET TROJAN Possible NanoCore C2 60B497498090192.168.2.3185.244.26.194
                            07/22/21-17:16:50.097122TCP2025019ET TROJAN Possible NanoCore C2 60B497528090192.168.2.3185.244.26.194
                            07/22/21-17:16:57.147005TCP2025019ET TROJAN Possible NanoCore C2 60B497538090192.168.2.3185.244.26.194
                            07/22/21-17:17:04.420377TCP2025019ET TROJAN Possible NanoCore C2 60B497548090192.168.2.3185.244.26.194
                            07/22/21-17:17:11.448870TCP2025019ET TROJAN Possible NanoCore C2 60B497558090192.168.2.3185.244.26.194
                            07/22/21-17:17:18.070997TCP2025019ET TROJAN Possible NanoCore C2 60B497568090192.168.2.3185.244.26.194

                            Network Port Distribution

                            TCP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            Jul 22, 2021 17:15:57.327195883 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:57.531862974 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:57.534015894 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:57.652961969 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:57.885468006 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:57.885555029 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:58.133164883 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:58.133285999 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:58.493752956 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:58.574599981 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:58.819876909 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:58.822911978 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:58.871458054 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:58.871619940 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:58.871722937 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:58.871735096 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:58.871862888 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:58.871978045 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:58.874828100 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:58.875153065 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.066279888 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.066489935 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.066639900 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.066744089 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.066837072 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.067109108 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.069801092 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.069830894 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.069881916 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.069951057 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.069978952 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.071012020 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.261334896 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.261678934 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.261759996 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.261779070 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.261985064 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.262074947 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.262084007 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.262115955 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.262182951 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.262252092 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.262574911 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.262644053 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.265378952 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.265439034 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.265501976 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.265952110 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.267570972 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.267647028 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.267698050 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.267712116 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.267756939 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.267791033 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.267795086 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.267874002 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.636511087 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.636549950 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.636586905 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.636636019 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.636679888 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.636717081 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.636756897 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.636797905 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.636868000 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.636905909 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.636908054 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.636941910 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.636945963 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.636950970 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.636959076 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.636993885 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637037039 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637074947 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637088060 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.637115955 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637129068 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.637156010 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637192965 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637231112 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637268066 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637295961 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.637314081 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637326002 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.637361050 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637391090 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637422085 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637454033 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637473106 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.637487888 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.637495041 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637523890 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.637532949 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637583017 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637624979 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637650013 CEST497278090192.168.2.3185.244.26.194
                            Jul 22, 2021 17:15:59.637665033 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637696028 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637727022 CEST809049727185.244.26.194192.168.2.3
                            Jul 22, 2021 17:15:59.637756109 CEST809049727185.244.26.194192.168.2.3

                            UDP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            Jul 22, 2021 17:15:04.763046026 CEST4919953192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:04.816519022 CEST53491998.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:04.922252893 CEST5062053192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:04.980652094 CEST53506208.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:05.966795921 CEST6493853192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:06.018944979 CEST53649388.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:07.723407030 CEST6015253192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:07.775559902 CEST53601528.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:09.066780090 CEST5754453192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:09.118920088 CEST53575448.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:10.847954035 CEST5598453192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:10.907686949 CEST53559848.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:12.146908045 CEST6418553192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:12.207806110 CEST53641858.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:13.845693111 CEST6511053192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:13.906315088 CEST53651108.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:15.560169935 CEST5836153192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:15.613352060 CEST53583618.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:17.903354883 CEST6349253192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:17.952857018 CEST53634928.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:19.524101973 CEST6083153192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:19.573231936 CEST53608318.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:20.962048054 CEST6010053192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:21.019257069 CEST53601008.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:24.582153082 CEST5319553192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:24.631280899 CEST53531958.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:26.460402966 CEST5014153192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:26.517627001 CEST53501418.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:37.889480114 CEST5302353192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:37.949548006 CEST53530238.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:38.603039026 CEST4956353192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:38.678119898 CEST53495638.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:39.740140915 CEST5135253192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:39.802215099 CEST53513528.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:40.556672096 CEST5934953192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:40.618021965 CEST53593498.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:41.425570965 CEST5708453192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:41.485343933 CEST53570848.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:44.741709948 CEST5882353192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:44.793931007 CEST53588238.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:45.504014015 CEST5756853192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:45.555970907 CEST53575688.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:56.759084940 CEST5054053192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:56.923748970 CEST53505408.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:57.187777042 CEST5436653192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:57.249794960 CEST53543668.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:57.951250076 CEST5303453192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:58.008028030 CEST53530348.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:58.493403912 CEST5776253192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:58.552948952 CEST53577628.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:58.892782927 CEST5543553192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:58.960469961 CEST53554358.8.8.8192.168.2.3
                            Jul 22, 2021 17:15:59.229800940 CEST5071353192.168.2.38.8.8.8
                            Jul 22, 2021 17:15:59.295526981 CEST53507138.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:00.181078911 CEST5613253192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:00.241190910 CEST53561328.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:03.245335102 CEST5898753192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:03.303710938 CEST53589878.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:04.066680908 CEST5657953192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:04.116664886 CEST53565798.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:05.235856056 CEST6063353192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:05.296524048 CEST53606338.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:06.361121893 CEST6129253192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:06.418401957 CEST53612928.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:07.048366070 CEST6361953192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:07.097353935 CEST53636198.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:07.650682926 CEST6493853192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:07.711216927 CEST53649388.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:08.311414003 CEST6194653192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:08.369090080 CEST53619468.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:13.270433903 CEST6491053192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:13.327728033 CEST53649108.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:15.485491991 CEST5212353192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:15.542777061 CEST53521238.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:21.740432978 CEST5613053192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:21.797602892 CEST53561308.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:28.626430035 CEST5633853192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:28.781832933 CEST53563388.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:35.643198013 CEST5942053192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:35.703490973 CEST53594208.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:42.720694065 CEST5878453192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:42.780225992 CEST53587848.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:46.094414949 CEST6397853192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:46.162256002 CEST53639788.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:48.411180019 CEST6293853192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:48.486733913 CEST53629388.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:49.797224045 CEST5570853192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:49.857126951 CEST53557088.8.8.8192.168.2.3
                            Jul 22, 2021 17:16:56.884917021 CEST5680353192.168.2.38.8.8.8
                            Jul 22, 2021 17:16:56.943536043 CEST53568038.8.8.8192.168.2.3
                            Jul 22, 2021 17:17:04.036845922 CEST5714553192.168.2.38.8.8.8
                            Jul 22, 2021 17:17:04.189584017 CEST53571458.8.8.8192.168.2.3
                            Jul 22, 2021 17:17:11.173968077 CEST5535953192.168.2.38.8.8.8
                            Jul 22, 2021 17:17:11.235089064 CEST53553598.8.8.8192.168.2.3
                            Jul 22, 2021 17:17:17.807742119 CEST5830653192.168.2.38.8.8.8
                            Jul 22, 2021 17:17:17.867338896 CEST53583068.8.8.8192.168.2.3

                            DNS Queries

                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                            Jul 22, 2021 17:15:56.759084940 CEST192.168.2.38.8.8.80xd325Standard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:07.048366070 CEST192.168.2.38.8.8.80x8b3eStandard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:13.270433903 CEST192.168.2.38.8.8.80xfd27Standard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:21.740432978 CEST192.168.2.38.8.8.80x8bbeStandard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:28.626430035 CEST192.168.2.38.8.8.80xf1e6Standard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:35.643198013 CEST192.168.2.38.8.8.80xa0daStandard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:42.720694065 CEST192.168.2.38.8.8.80x47dfStandard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:49.797224045 CEST192.168.2.38.8.8.80x365cStandard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:56.884917021 CEST192.168.2.38.8.8.80xace2Standard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                            Jul 22, 2021 17:17:04.036845922 CEST192.168.2.38.8.8.80x22c1Standard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                            Jul 22, 2021 17:17:11.173968077 CEST192.168.2.38.8.8.80x9904Standard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                            Jul 22, 2021 17:17:17.807742119 CEST192.168.2.38.8.8.80xaf5fStandard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)

                            DNS Answers

                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                            Jul 22, 2021 17:15:56.923748970 CEST8.8.8.8192.168.2.30xd325No error (0)omaprilcode.duckdns.org185.244.26.194A (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:07.097353935 CEST8.8.8.8192.168.2.30x8b3eNo error (0)omaprilcode.duckdns.org185.244.26.194A (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:13.327728033 CEST8.8.8.8192.168.2.30xfd27No error (0)omaprilcode.duckdns.org185.244.26.194A (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:21.797602892 CEST8.8.8.8192.168.2.30x8bbeNo error (0)omaprilcode.duckdns.org185.244.26.194A (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:28.781832933 CEST8.8.8.8192.168.2.30xf1e6No error (0)omaprilcode.duckdns.org185.244.26.194A (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:35.703490973 CEST8.8.8.8192.168.2.30xa0daNo error (0)omaprilcode.duckdns.org185.244.26.194A (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:42.780225992 CEST8.8.8.8192.168.2.30x47dfNo error (0)omaprilcode.duckdns.org185.244.26.194A (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:49.857126951 CEST8.8.8.8192.168.2.30x365cNo error (0)omaprilcode.duckdns.org185.244.26.194A (IP address)IN (0x0001)
                            Jul 22, 2021 17:16:56.943536043 CEST8.8.8.8192.168.2.30xace2No error (0)omaprilcode.duckdns.org185.244.26.194A (IP address)IN (0x0001)
                            Jul 22, 2021 17:17:04.189584017 CEST8.8.8.8192.168.2.30x22c1No error (0)omaprilcode.duckdns.org185.244.26.194A (IP address)IN (0x0001)
                            Jul 22, 2021 17:17:11.235089064 CEST8.8.8.8192.168.2.30x9904No error (0)omaprilcode.duckdns.org185.244.26.194A (IP address)IN (0x0001)
                            Jul 22, 2021 17:17:17.867338896 CEST8.8.8.8192.168.2.30xaf5fNo error (0)omaprilcode.duckdns.org185.244.26.194A (IP address)IN (0x0001)

                            Code Manipulations

                            Statistics

                            Behavior

                            Click to jump to process

                            System Behavior

                            General

                            Start time:17:15:09
                            Start date:22/07/2021
                            Path:C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\user\Desktop\R6093846s-Invoice-Receipt.exe'
                            Imagebase:0x300000
                            File size:896000 bytes
                            MD5 hash:CD0645CB78B55F0BABBDBC4D51F23BD8
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.305161176.000000000396B000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.305161176.000000000396B000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.305161176.000000000396B000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.304879840.0000000003759000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.304879840.0000000003759000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.304879840.0000000003759000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:low

                            General

                            Start time:17:15:50
                            Start date:22/07/2021
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UALCBPTejUQxQ' /XML 'C:\Users\user\AppData\Local\Temp\tmpCCAD.tmp'
                            Imagebase:0xae0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:17:15:51
                            Start date:22/07/2021
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6b2800000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:17:15:51
                            Start date:22/07/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            Wow64 process (32bit):false
                            Commandline:{path}
                            Imagebase:0x1b0000
                            File size:45152 bytes
                            MD5 hash:2867A3817C9245F7CF518524DFD18F28
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:17:15:52
                            Start date:22/07/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            Wow64 process (32bit):true
                            Commandline:{path}
                            Imagebase:0x4f0000
                            File size:45152 bytes
                            MD5 hash:2867A3817C9245F7CF518524DFD18F28
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.485019554.0000000006B10000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000014.00000002.485019554.0000000006B10000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.484978078.0000000006AF0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000014.00000002.484978078.0000000006AF0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.483826250.0000000005440000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000014.00000002.483826250.0000000005440000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.484104685.0000000005B90000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000014.00000002.484104685.0000000005B90000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.484104685.0000000005B90000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.485071825.0000000006B30000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000014.00000002.485071825.0000000006B30000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.480562084.0000000004325000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.470391681.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.470391681.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.470391681.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.484960992.0000000006AE0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000014.00000002.484960992.0000000006AE0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.479043770.0000000003891000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.479043770.0000000003891000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.484915497.0000000006AC0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000014.00000002.484915497.0000000006AC0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.484897789.0000000006AB0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000014.00000002.484897789.0000000006AB0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.485130700.0000000006B80000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000014.00000002.485130700.0000000006B80000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.480703873.0000000004486000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.480703873.0000000004486000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.484998886.0000000006B00000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000014.00000002.484998886.0000000006B00000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.484851372.0000000006A80000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000014.00000002.484851372.0000000006A80000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.485085026.0000000006B40000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000014.00000002.485085026.0000000006B40000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.474458367.0000000002891000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.484936957.0000000006AD0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000014.00000002.484936957.0000000006AD0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.480187851.0000000004161000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.480187851.0000000004161000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.484499149.0000000006190000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000014.00000002.484499149.0000000006190000.00000004.00000001.sdmp, Author: Florian Roth
                            Reputation:high

                            Disassembly

                            Code Analysis

                            Reset < >