Loading ...

Play interactive tourEdit tour

Windows Analysis Report PI A19T010620.exe

Overview

General Information

Sample Name:PI A19T010620.exe
Analysis ID:458957
MD5:62aaab0942211b9d11a7755d1970adfd
SHA1:2703f7f409aeb01b0d68e83f336241f4b7923532
SHA256:23e9628689de5cffc14abcc1d39a259f54bde8e50304af29d4e127359163e1c4
Tags:exenull
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AgentTesla
.NET source code contains very large array initializations
.NET source code contains very large strings
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Modifies the hosts file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Suspicious Process Start Without DLL
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • PI A19T010620.exe (PID: 7024 cmdline: 'C:\Users\user\Desktop\PI A19T010620.exe' MD5: 62AAAB0942211B9D11A7755D1970ADFD)
    • RegSvcs.exe (PID: 6464 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • NXLun.exe (PID: 7164 cmdline: 'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe' MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 6160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • NXLun.exe (PID: 2432 cmdline: 'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe' MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 7084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "compliance2@odessabd.com", "Password": "abc321", "Host": "mail.odessabd.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: RegSvcs.exe PID: 6464JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: RegSvcs.exe PID: 6464JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

                Sigma Overview

                System Summary:

                barindex
                Sigma detected: Suspicious Process Start Without DLLShow sources
                Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: 'C:\Users\user\Desktop\PI A19T010620.exe' , ParentImage: C:\Users\user\Desktop\PI A19T010620.exe, ParentProcessId: 7024, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6464
                Sigma detected: Possible Applocker BypassShow sources
                Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: 'C:\Users\user\Desktop\PI A19T010620.exe' , ParentImage: C:\Users\user\Desktop\PI A19T010620.exe, ParentProcessId: 7024, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6464

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "compliance2@odessabd.com", "Password": "abc321", "Host": "mail.odessabd.com"}
                Multi AV Scanner detection for submitted fileShow sources
                Source: PI A19T010620.exeVirustotal: Detection: 51%Perma Link
                Source: PI A19T010620.exeMetadefender: Detection: 42%Perma Link
                Source: PI A19T010620.exeReversingLabs: Detection: 78%
                Machine Learning detection for sampleShow sources
                Source: PI A19T010620.exeJoe Sandbox ML: detected
                Source: 2.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: PI A19T010620.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                Source: PI A19T010620.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: RegSvcs.pdb, source: NXLun.exe, 00000009.00000002.744648798.00000000001B2000.00000002.00020000.sdmp, NXLun.exe, 0000000D.00000002.761737974.0000000000AB2000.00000002.00020000.sdmp, NXLun.exe.2.dr
                Source: Binary string: RegSvcs.pdb source: NXLun.exe, NXLun.exe.2.dr
                Source: Joe Sandbox ViewIP Address: 192.185.90.36 192.185.90.36
                Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                Source: unknownDNS traffic detected: queries for: mail.odessabd.com
                Source: RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                Source: RegSvcs.exe, 00000002.00000002.901604014.0000000002788000.00000004.00000001.sdmp, RegSvcs.exe, 00000002.00000002.901542292.000000000275D000.00000004.00000001.sdmp, RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpString found in binary or memory: http://P02rvktl5O.com
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.o_
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                Source: RegSvcs.exe, 00000002.00000003.880396544.0000000005619000.00000004.00000001.sdmpString found in binary or memory: http://crl.microsoft.co9
                Source: PI A19T010620.exeString found in binary or memory: http://i.imgur.com/blkrqBo.gifiThis
                Source: RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpString found in binary or memory: http://mOEDeY.com
                Source: RegSvcs.exe, 00000002.00000002.901557138.0000000002765000.00000004.00000001.sdmpString found in binary or memory: http://mail.odessabd.com
                Source: RegSvcs.exe, 00000002.00000002.901557138.0000000002765000.00000004.00000001.sdmpString found in binary or memory: http://odessabd.com
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
                Source: PI A19T010620.exe, 00000000.00000003.638876019.0000000001ADD000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%$
                Source: RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                Source: PI A19T010620.exeString found in binary or memory: https://static.hummingbird.me/anime/poster_images/000/010/716/large/0fd8df1b586e60a0b1591cd8555c072f
                Source: RegSvcs.exe, 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                Source: RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                Spam, unwanted Advertisements and Ransom Demands:

                barindex
                Modifies the hosts fileShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                System Summary:

                barindex
                .NET source code contains very large array initializationsShow sources
                Source: 2.2.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bD95BE525u002dE724u002d4092u002dAC05u002d1C2D15F5ED67u007d/CB5629C0u002dCF6Bu002d4547u002dA8F4u002d3F00408FA47B.csLarge array initialization: .cctor: array initializer size 11946
                .NET source code contains very large stringsShow sources
                Source: PI A19T010620.exe, UT1ISfP0HmUF7h5yru/aMxeoyTl2XtxGNHxhY.csLong String: Length: 10292
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00699822
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0069C128
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006905C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00695ED0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006973CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00702D50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0070D500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0070AB78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00701FF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0070CCB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0070F330
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00820270
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_008285E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00824B98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0082D1EA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_008253E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0082533A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_022347A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02233CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_022346B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02235471
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe 43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                Source: PI A19T010620.exe, 00000000.00000000.634626091.000000000110A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCompletionActionInvok.exe2 vs PI A19T010620.exe
                Source: PI A19T010620.exeBinary or memory string: OriginalFilenameCompletionActionInvok.exe2 vs PI A19T010620.exe
                Source: PI A19T010620.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                Source: 2.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 2.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: PI A19T010620.exe, UT1ISfP0HmUF7h5yru/aMxeoyTl2XtxGNHxhY.csBase64 encoded string: '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
                Source: PI A19T010620.exe, RMkxix1j4WpBSOrCtp/HyqsKqF8HIu1tHY1Lq.csBase64 encoded string: 'iVBORw0KGgoAAAANSUhEUgAAACgAAAAoCAYAAACM/rhtAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAAKRJREFUeNpi/P//P8NgBkwMgxyMOnDUgaMOHHXgqANHHTjqwAEGoNYMMgYCeyA+CZIiAm8HYhWaugeLA58T6TgY3ohk/l4S9aLjvejuwRbFEiR6WhGJ/YvCAMTQz0LlFOM5mospBBSnQVo7cDQNjqZBaqTBpyQ66hEt0yC2msSDhNrkEhBr0bKqYxwdWRh14KgDRx046sBRB446cNSBQ9qBAAEGAPhFqjdpHPl0AAAAAElFTkSuQmCC'
                Source: PI A19T010620.exe, KmCTf3r14i9sSqxs5ok/RFJlX4rFCGp00pxrbq5.csBase64 encoded string: 'iVBORw0KGgoAAAANSUhEUgAAAAwAAAAMCAYAAABWdVznAAAACXBIWXMAAAsTAAALEwEAmpwYAAAKT2lDQ1BQaG90b3Nob3AgSUNDIHByb2ZpbGUAAHjanVNnVFPpFj333vRCS4iAlEtvUhUIIFJCi4AUkSYqIQkQSoghodkVUcERRUUEG8igiAOOjoCMFVEsDIoK2AfkIaKOg6OIisr74Xuja9a89+bN/rXXPues852zzwfACAyWSDNRNYAMqUIeEeCDx8TG4eQuQIEKJHAAEAizZCFz/SMBAPh+PDwrIsAHvgABeNMLCADATZvAMByH/w/qQplcAYCEAcB0kThLCIAUAEB6jkKmAEBGAYCdmCZTAKAEAGDLY2LjAFAtAGAnf+bTAICd+Jl7AQBblCEVAaCRACATZYhEAGg7AKzPVopFAFgwABRmS8Q5ANgtADBJV2ZIALC3AMDOEAuyAAgMADBRiIUpAAR7AGDIIyN4AISZABRG8lc88SuuEOcqAAB4mbI8uSQ5RYFbCC1xB1dXLh4ozkkXKxQ2YQJhmkAuwnmZGTKBNA/g88wAAKCRFRHgg/P9eM4Ors7ONo62Dl8t6r8G/yJiYuP+5c+rcEAAAOF0ftH+LC+zGoA7BoBt/qIl7gRoXgugdfeLZrIPQLUAoOnaV/Nw+H48PEWhkLnZ2eXk5NhKxEJbYcpXff5nwl/AV/1s+X48/Pf14L7iJIEyXYFHBPjgwsz0TKUcz5IJhGLc5o9H/LcL//wd0yLESWK5WCoU41EScY5EmozzMqUiiUKSKcUl0v9k4t8s+wM+3zUAsGo+AXuRLahdYwP2SycQWHTA4vcAAPK7b8HUKAgDgGiD4c93/+8//UegJQCAZkmScQAAXkQkLlTKsz/HCAAARKCBKrBBG/TBGCzABhzBBdzBC/xgNoRCJMTCQhBCCmSAHHJgKayCQiiGzbAdKmAv1EAdNMBRaIaTcA4uwlW4Dj1wD/phCJ7BKLyBCQRByAgTYSHaiAFiilgjjggXmYX4IcFIBBKLJCDJiBRRIkuRNUgxUopUIFVIHfI9cgI5h1xGupE7yAAygvyGvEcxlIGyUT3UDLVDuag3GoRGogvQZHQxmo8WoJvQcrQaPYw2oefQq2gP2o8+Q8cwwOgYBzPEbDAuxsNCsTgsCZNjy7EirAyrxhqwVqwDu4n1Y8+xdwQSgUXACTYEd0IgYR5BSFhMWE7YSKggHCQ0EdoJNwkDhFHCJyKTqEu0JroR+cQYYjIxh1hILCPWEo8TLxB7iEPENyQSiUMyJ7mQAkmxpFTSEtJG0m5SI+ksqZs0SBojk8naZGuyBzmULCAryIXkneTD5DPkG+Qh8lsKnWJAcaT4U+IoUspqShnlEOU05QZlmDJBVaOaUt2ooVQRNY9aQq2htlKvUYeoEzR1mjnNgxZJS6WtopXTGmgXaPdpr+h0uhHdlR5Ol9BX0svpR+iX6AP0dwwNhhWDx4hnKBmbGAcYZxl3GK+YTKYZ04sZx1QwNzHrmOeZD5lvVVgqtip8FZHKCpVKlSaVGyovVKmqpqreqgtV81XLVI+pXlN9rkZVM1PjqQnUlqtVqp1Q61MbU2epO6iHqmeob1Q/pH5Z/YkGWcNMw09DpFGgsV/jvMYgC2MZs3gsIWsNq4Z1gTXEJrHN2Xx2KruY/R27iz2qqaE5QzNKM1ezUvOUZj8H45hx+Jx0TgnnKKeX836K3hTvKeIpG6Y0TLkxZVxrqpaXllirSKtRq0frvTau7aedpr1Fu1n7gQ5Bx0onXCdHZ4/OBZ3nU9lT3acKpxZNPTr1ri6qa6UbobtEd79up+6Ynr5egJ5Mb6feeb3n+hx9L/1U/W36p/VHDFgGswwkBtsMzhg8xTVxbzwdL8fb8VFDXcNAQ6VhlWGX4YSRudE8o9VGjUYPjGnGXOMk423GbcajJgYmISZLTepN7ppSTbmmKaY7TDtMx83MzaLN1pk1mz0x1zLnm+eb15vft2BaeFostqi2uGVJsuRaplnutrxuhVo5WaVYVVpds0atna0l1rutu6cRp7lOk06rntZnw7Dxtsm2qbcZsOXYBtuutm22fWFnYhdnt8Wuw+6TvZN9un2N/T0HDYfZDqsdWh1+c7RyFDpWOt6azpzuP33F9JbpL2dYzxDP2DPjthPLKcRpnVOb00dnF2e5c4PziIuJS4LLLpc+Lpsbxt3IveRKdPVxXeF60vWdm7Obwu2o26/uNu5p7ofcn8w0nymeWTNz0MPIQ+BR5dE/C5+VMGvfrH5PQ0+BZ7XnIy9jL5FXrdewt6V3qvdh7xc+9j5yn+M+4zw33jLeWV/MN8C3yLfLT8Nvnl+F30N/I/9k/3r/0QCngCUBZwOJgUGBWwL7+Hp8Ib+OPzrbZfay2e1BjKC5QRVBj4KtguXBrSFoyOyQrSH355jOkc5pDoVQfujW0Adh5mGLw34MJ4WHhVeGP45wiFga0TGXNXfR3ENz30T6RJZE3ptnMU85ry1KNSo+qi5qPNo3ujS6P8YuZlnM1VidWElsSxw5LiquNm5svt/87fOH4p3iC+N7F5gvyF1weaHOwvSFpxapLhIsOpZATIhOOJTwQRAqqBaMJfITdyWOCnnCHcJnIi/RNtGI2ENcKh5O8kgqTXqS7JG8NXkkxTOlLOW5hCepkLxMDUzdmzqeFpp2IG0yPTq9MYOSkZBxQqohTZO2Z+pn5mZ2y6xlhbL+xW6Lty8elQfJa7OQrAVZLQq2QqboVFoo1yoHsmdlV2a/zYnKOZarnivN7cyzytuQN5zvn//tEsIS4ZK2pYZLVy0dWOa9rGo5sjxxedsK4xUFK4ZWBqw8uIq2Km3VT6vtV5eufr0mek1rgV7ByoLBtQFr6wtVCuWFfevc1+1dT1gvWd+1YfqGnRs+FYmKrhTbF5cVf9go3HjlG4dvyr+Z3JS0qavEuWTPZtJm6ebeLZ5bDpaql+aXDm4N2dq0Dd9WtO319kXbL5fNKNu7g7ZDuaO
                Source: PI A19T010620.exe, iMW8vPrqMl8WDQWgJ9A/oCFkMergQS9qeMrer0U.csBase64 encoded string: 'iVBORw0KGgoAAAANSUhEUgAAAAwAAAAMCAYAAABWdVznAAAACXBIWXMAAAsTAAALEwEAmpwYAAAKT2lDQ1BQaG90b3Nob3AgSUNDIHByb2ZpbGUAAHjanVNnVFPpFj333vRCS4iAlEtvUhUIIFJCi4AUkSYqIQkQSoghodkVUcERRUUEG8igiAOOjoCMFVEsDIoK2AfkIaKOg6OIisr74Xuja9a89+bN/rXXPues852zzwfACAyWSDNRNYAMqUIeEeCDx8TG4eQuQIEKJHAAEAizZCFz/SMBAPh+PDwrIsAHvgABeNMLCADATZvAMByH/w/qQplcAYCEAcB0kThLCIAUAEB6jkKmAEBGAYCdmCZTAKAEAGDLY2LjAFAtAGAnf+bTAICd+Jl7AQBblCEVAaCRACATZYhEAGg7AKzPVopFAFgwABRmS8Q5ANgtADBJV2ZIALC3AMDOEAuyAAgMADBRiIUpAAR7AGDIIyN4AISZABRG8lc88SuuEOcqAAB4mbI8uSQ5RYFbCC1xB1dXLh4ozkkXKxQ2YQJhmkAuwnmZGTKBNA/g88wAAKCRFRHgg/P9eM4Ors7ONo62Dl8t6r8G/yJiYuP+5c+rcEAAAOF0ftH+LC+zGoA7BoBt/qIl7gRoXgugdfeLZrIPQLUAoOnaV/Nw+H48PEWhkLnZ2eXk5NhKxEJbYcpXff5nwl/AV/1s+X48/Pf14L7iJIEyXYFHBPjgwsz0TKUcz5IJhGLc5o9H/LcL//wd0yLESWK5WCoU41EScY5EmozzMqUiiUKSKcUl0v9k4t8s+wM+3zUAsGo+AXuRLahdYwP2SycQWHTA4vcAAPK7b8HUKAgDgGiD4c93/+8//UegJQCAZkmScQAAXkQkLlTKsz/HCAAARKCBKrBBG/TBGCzABhzBBdzBC/xgNoRCJMTCQhBCCmSAHHJgKayCQiiGzbAdKmAv1EAdNMBRaIaTcA4uwlW4Dj1wD/phCJ7BKLyBCQRByAgTYSHaiAFiilgjjggXmYX4IcFIBBKLJCDJiBRRIkuRNUgxUopUIFVIHfI9cgI5h1xGupE7yAAygvyGvEcxlIGyUT3UDLVDuag3GoRGogvQZHQxmo8WoJvQcrQaPYw2oefQq2gP2o8+Q8cwwOgYBzPEbDAuxsNCsTgsCZNjy7EirAyrxhqwVqwDu4n1Y8+xdwQSgUXACTYEd0IgYR5BSFhMWE7YSKggHCQ0EdoJNwkDhFHCJyKTqEu0JroR+cQYYjIxh1hILCPWEo8TLxB7iEPENyQSiUMyJ7mQAkmxpFTSEtJG0m5SI+ksqZs0SBojk8naZGuyBzmULCAryIXkneTD5DPkG+Qh8lsKnWJAcaT4U+IoUspqShnlEOU05QZlmDJBVaOaUt2ooVQRNY9aQq2htlKvUYeoEzR1mjnNgxZJS6WtopXTGmgXaPdpr+h0uhHdlR5Ol9BX0svpR+iX6AP0dwwNhhWDx4hnKBmbGAcYZxl3GK+YTKYZ04sZx1QwNzHrmOeZD5lvVVgqtip8FZHKCpVKlSaVGyovVKmqpqreqgtV81XLVI+pXlN9rkZVM1PjqQnUlqtVqp1Q61MbU2epO6iHqmeob1Q/pH5Z/YkGWcNMw09DpFGgsV/jvMYgC2MZs3gsIWsNq4Z1gTXEJrHN2Xx2KruY/R27iz2qqaE5QzNKM1ezUvOUZj8H45hx+Jx0TgnnKKeX836K3hTvKeIpG6Y0TLkxZVxrqpaXllirSKtRq0frvTau7aedpr1Fu1n7gQ5Bx0onXCdHZ4/OBZ3nU9lT3acKpxZNPTr1ri6qa6UbobtEd79up+6Ynr5egJ5Mb6feeb3n+hx9L/1U/W36p/VHDFgGswwkBtsMzhg8xTVxbzwdL8fb8VFDXcNAQ6VhlWGX4YSRudE8o9VGjUYPjGnGXOMk423GbcajJgYmISZLTepN7ppSTbmmKaY7TDtMx83MzaLN1pk1mz0x1zLnm+eb15vft2BaeFostqi2uGVJsuRaplnutrxuhVo5WaVYVVpds0atna0l1rutu6cRp7lOk06rntZnw7Dxtsm2qbcZsOXYBtuutm22fWFnYhdnt8Wuw+6TvZN9un2N/T0HDYfZDqsdWh1+c7RyFDpWOt6azpzuP33F9JbpL2dYzxDP2DPjthPLKcRpnVOb00dnF2e5c4PziIuJS4LLLpc+Lpsbxt3IveRKdPVxXeF60vWdm7Obwu2o26/uNu5p7ofcn8w0nymeWTNz0MPIQ+BR5dE/C5+VMGvfrH5PQ0+BZ7XnIy9jL5FXrdewt6V3qvdh7xc+9j5yn+M+4zw33jLeWV/MN8C3yLfLT8Nvnl+F30N/I/9k/3r/0QCngCUBZwOJgUGBWwL7+Hp8Ib+OPzrbZfay2e1BjKC5QRVBj4KtguXBrSFoyOyQrSH355jOkc5pDoVQfujW0Adh5mGLw34MJ4WHhVeGP45wiFga0TGXNXfR3ENz30T6RJZE3ptnMU85ry1KNSo+qi5qPNo3ujS6P8YuZlnM1VidWElsSxw5LiquNm5svt/87fOH4p3iC+N7F5gvyF1weaHOwvSFpxapLhIsOpZATIhOOJTwQRAqqBaMJfITdyWOCnnCHcJnIi/RNtGI2ENcKh5O8kgqTXqS7JG8NXkkxTOlLOW5hCepkLxMDUzdmzqeFpp2IG0yPTq9MYOSkZBxQqohTZO2Z+pn5mZ2y6xlhbL+xW6Lty8elQfJa7OQrAVZLQq2QqboVFoo1yoHsmdlV2a/zYnKOZarnivN7cyzytuQN5zvn//tEsIS4ZK2pYZLVy0dWOa9rGo5sjxxedsK4xUFK4ZWBqw8uIq2Km3VT6vtV5eufr0mek1rgV7ByoLBtQFr6wtVCuWFfevc1+1dT1gvWd+1YfqGnRs+FYmKrhTbF5cVf9go3HjlG4dvyr+Z3JS0qavEuWTPZtJm6ebeLZ5bDpaql+aXDm4N2dq0Dd9WtO319kXbL5fNKNu7g7ZDuaO
                Source: PI A19T010620.exe, kPcEgIDe3LcBgmnfa5/dXcJw5eSqWyl8tPiJi.csBase64 encoded string: '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', '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'
                Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@7/6@2/1
                Source: C:\Users\user\Desktop\PI A19T010620.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PI A19T010620.exe.logJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeMutant created: \Sessions\1\BaseNamedObjects\fOKJpBwJFCycnicKjUmQBO
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6160:120:WilError_01
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7084:120:WilError_01
                Source: PI A19T010620.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\PI A19T010620.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\PI A19T010620.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: PI A19T010620.exeVirustotal: Detection: 51%
                Source: PI A19T010620.exeMetadefender: Detection: 42%
                Source: PI A19T010620.exeReversingLabs: Detection: 78%
                Source: unknownProcess created: C:\Users\user\Desktop\PI A19T010620.exe 'C:\Users\user\Desktop\PI A19T010620.exe'
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe 'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe'
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe 'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe'
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\PI A19T010620.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: PI A19T010620.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: PI A19T010620.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: PI A19T010620.exeStatic file information: File size 1141760 > 1048576
                Source: PI A19T010620.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x116200
                Source: PI A19T010620.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: RegSvcs.pdb, source: NXLun.exe, 00000009.00000002.744648798.00000000001B2000.00000002.00020000.sdmp, NXLun.exe, 0000000D.00000002.761737974.0000000000AB2000.00000002.00020000.sdmp, NXLun.exe.2.dr
                Source: Binary string: RegSvcs.pdb source: NXLun.exe, NXLun.exe.2.dr
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00699098 push eax; retn 0067h
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00707E3F push edi; retn 0000h
                Source: initial sampleStatic PE information: section name: .text entropy: 6.92181951931
                Source: PI A19T010620.exe, qvNbH0bvCJJ5sEdLep/Mu0PaDBWeKE0LGaBNq.csHigh entropy of concatenated method names: 'mOnOXOUwh', 'm8ImXYlKc', 'e4w5HguIr', 'USVF5dQiA', 'HAwBR59RN', 'vqklYUbcc', 'zEUSq2lGb', 'UMQoqHpTO', '.ctor', 'DWlb84ZTB'
                Source: PI A19T010620.exe, GvGHWtr8geVHcOaSpSQ/yuW4QUrdELxq4VKqupN.csHigh entropy of concatenated method names: '.ctor', 'qRx3ltqnCe', 'ocO3ZwfBWr', 'MhL3otCdYV', 'nwN3nBeFEt', 'dGG34ecTQW', 'KBG3t5Wwtu', 'uu33pun9ro', 'U9k3PUywvg', 'uFr3UTeI1F'
                Source: PI A19T010620.exe, UT1ISfP0HmUF7h5yru/aMxeoyTl2XtxGNHxhY.csHigh entropy of concatenated method names: 'UsGsuGBBDX', 'CqQsA6iZ1r', 'U99sWxRHOW', 'mWbs7EIPTE', 'pKfs6Cvf4b', 'vKssCFte4H', 'udcsJIh3gI', 'l9dsEUxDZY', 'SSUswtmabh', 'Ungs4fQrcD'
                Source: PI A19T010620.exe, RMkxix1j4WpBSOrCtp/HyqsKqF8HIu1tHY1Lq.csHigh entropy of concatenated method names: 'uG3RJXEdRt', 'uSKRE4RxQB', 'AO3RicTRhO', 'hGgR1Sh2Cw', 'aIFR8wtPj2', 'nYSRbOJGCf', 'HxeRMgphAT', 'U6dRq301Su', 'i6lROZaLcR', 'jH3Rmbp0OV'
                Source: PI A19T010620.exe, hZAeC2fEYD9FWvhh5Ln/eEUUDxfiDtqFjqBhlph.csHigh entropy of concatenated method names: '.ctor', 'wbaZtpQYI2', 'mrZZdAP48w', 'c9dZPBBEnA', 'EWMZ9sfahL', 'NNKZkMfWl7', 'Sk0ZHIkvNt', 'Js8ZGkoS7j', 'cB5ZhrBPDh', 'RoqZImq4WH'
                Source: PI A19T010620.exe, QaZNhsfndbfHBGyQ8EL/CXA7vSfyF9K0IG3AJbs.csHigh entropy of concatenated method names: '.ctor', 'An5Zxhjwwj', 'D27ZrK7Ikj', 'CGcZNqo863', 'li6ZYtZMhN', 'TRCZs3Jcia', 'xBXZyOH9NJ', 'q1sZeYkOEE', 'R6xZuZF2KY', 'O5cZ2Oa388'
                Source: PI A19T010620.exe, ddL9GirCgCIKOyWCoNL/nZAuOwrooLuGGMtQE0Q.csHigh entropy of concatenated method names: '.ctor', 'LRIaz56K9f', 'c4H5xWIgbd', 'utM5gW3ZPg', 'kfq5NChqAc', 'EZw5VNwqjT', 'o1Y5stBpX1', 'VAu5RUcqyH', 'meN5ey7EMk', 'ycW5AJvCmL'
                Source: PI A19T010620.exe, Mjka9AJt0E95AD8pJE/CEgL45hGJBT7UFEJuj.csHigh entropy of concatenated method names: 'PYLy0pVdRo', 'jQny6EeIJ3', 'FanycwVsHb', 'jOCyJEXXRo', 'T6HyDIksoJ', 'R5QyijQWoF', 'dphyv3Zk73', 'er3y8COlko', '.ctor', 'A5Iy3O5cFE'
                Source: PI A19T010620.exe, xOOfAYUowQ6uAjwZT6/G23hX46CX2lNrgUZjK.csHigh entropy of concatenated method names: '.ctor', 'nTAyxurmVO', 'Dispose', 'jVEyrVxRkf', 'i9byggZOBs', 'xE2yNfo1SD', 'bdKyYEAhSM', 'tQnyVw1gPM', 'neORWXGo5K', 'xJtRU4s8Eh'
                Source: PI A19T010620.exe, Oit1GxfAD86vqb1eKx5/GxLljWfVQJW2c9AKuTw.csHigh entropy of concatenated method names: '.ctor', 'Ij7l0XPPLL', 'jHgl68rXgS', 'lcVlcjKJq7', 'do3lJMndQl', 'n2PlDu8449', 'Syylix21tK', 'tbrlvVZIMa', 'AvIl8wVoPZ', 'HjWl3bkdXx'
                Source: PI A19T010620.exe, L93p1Bf52J4VPEi19ma/YSMLSkfO52kD10v10vR.csHigh entropy of concatenated method names: '.ctor', 'xh2BpoRkHA', 'dlwBPS9yIA', 'INCBUDo1Jr', 'HkMBkdb4n6', 'HyEBXMtOKy', 'cXNBGrywKE', 'rNmBQCKMvm', 'cuEBIMKKUh', 'YAFBT1scsC'
                Source: PI A19T010620.exe, t3ufytffQe11T2tar6Z/v9UcmGfrJTHajHXn3MQ.csHigh entropy of concatenated method names: 'CsFBaBFmGC', 'LNdB5EpdFH', 'JCSBjuDtic', 'kZDBBQBuTN', 'gaUBZUSeSR', 'vSSBSaCP64', '.ctor', 'lAmBO8QcjO', 'SblBmC9jk8', 'yvD4HSidvBcfipJjJaG'
                Source: PI A19T010620.exe, WnGAs4rUs3iaNCOsSXl/i5UZA9r6Yg2MxxStHvD.csHigh entropy of concatenated method names: 'z36vl33H7L', 'CPevZEaNNW', 'c3FvEn3dSf', 'WByvDXGNW3', 'U9iv1PAWpv', 'mGivvoB534', 'hkuvbNDVUp', 'Xh1v3E6S1I', 'MqKvq5ZXYY', 'qG2vKCOs3o'
                Source: PI A19T010620.exe, expMlPrPdgkRpO8Mdqx/mSqcV4rTrNQsaKpWjIL.csHigh entropy of concatenated method names: 'Xav1SScZOD', 'o8U1o6Sfiy', 'ygr1wjbYbT', 'Ks21488fca', 'oPi1dFvTs7', 'ioJ1pkaaeU', 'NQe1990rvL', 'Ipn1UWNGch', 'lUA1Havqx7', 'hHk1XDvEMp'
                Source: PI A19T010620.exe, JaMp6vr3A8XRuLJna99/XgclaBrKJI1x7o4PDiT.csHigh entropy of concatenated method names: 'BOM1uVKrsS', 'uXu1AqYpix', 'tyaiHaFf94', 'IYLiX8v36D', 'uDyihlMt3J', 'uBCiQvyYmU', 'd37ifsSk3v', 'RjbiTKUbrT', 'zCmizWATNm', 'fMA1xyVKMV'
                Source: PI A19T010620.exe, Ps8iYf3X87ONisiTGU/Y96rkSKLNRfGMUPdjW.csHigh entropy of concatenated method names: '.ctor', 'PbxVJM7TKp', 'uBWVEf8Bo8', 'NERVihJ3to', 'RBVV1IJELM', 'L9oV85fEYY', 'AvmVbhGuXr', 'CveVMHoSvy', 'r7rVqrhrfu', 'dIeVOMiCH8'
                Source: PI A19T010620.exe, wshKeM4nRiLoh8Pem4/GCTyu9l2Qrje7bP0Ey.csHigh entropy of concatenated method names: '.ctor', 'knJVy281KG', 'x0vVRFsNx1', 'OnPaint', 'OnMouseDown', 'OnMouseUp', 'OnMouseMove', 'a8pVs8YyTx', 'QV6hVMXA4l37oWt2Ku1', 'zrBdioXU8wEfuN0xbCf'
                Source: PI A19T010620.exe, dBIZYEvkARSnmHahkm/WvYP6cND47pRiI37kw.csHigh entropy of concatenated method names: 'UWFY5tS2Kr', 'WEKYBaZQXu', 'IQMYlhR0u6', 'xZ0YS3Moiy', 'kuGYoAaoBc', 'yO0YwPkC8O', 'tHBY4ABRjx', 'vl6YdIdn4m', 'XUhYpXmyWd', 'JrOY9G7EuB'
                Source: PI A19T010620.exe, M0LrV7rMSRRc0uB1OSO/yRbe2QrWPMYoHF4CtfL.csHigh entropy of concatenated method names: '.ctor', 'IBkCorVwvW', 'fZRCnakViD', 'AiQC4Xib2T', 'n5jCt8uXHe', 'oFCCp4H4Si', 'fIGCPNmCIB', 'yLmCUyEuAS', 'DSKCkGZA0y', 'DTkCXgntZs'
                Source: PI A19T010620.exe, c06joxrb6sVkysY8371/lHNJvTrB12D5h48U1Bp.csHigh entropy of concatenated method names: 'LBtCutgsO4', 'bhgCAOTLBe', 'sT16DcityL', 'HRM6iwqHhQ', 'waO6vQnCGd', 'SJu68bowVe', 'Uhk637ch27', 'x4U6M7ChFp', 'K3i6KseL2Y', 'QjG6OcSICt'
                Source: PI A19T010620.exe, TB6UUZrE1N4emrxgMA3/XCXEtkriXqCqXP9k4TX.csHigh entropy of concatenated method names: '.ctor', 'IXw6eGq4J1', 'MPD6uRbbIJ', 'pT26245Kn0', 'JAc6W1Ke3I', 'frN6gubYZb', 'JDe6NJMW3P', 'EdV6Y8794q', 'noc6VALbqS', 'Ob46spy69p'
                Source: PI A19T010620.exe, k35AJrrjov5CT8YOyby/SdSDYDrwHNpiUsXFZCJ.csHigh entropy of concatenated method names: 'fUXDWVwu9K', 'IXtD7Q5LZ2', 'ixgDAEp7tW', 'XSND6b7T1Y', 'xEmDCuBeag', 's8iDJSVemd', 'YpRDEdrpiB', 'S3eDiHp5u2', 'YfyD1ofJ3n', 'l3DD8JtA4K'
                Source: PI A19T010620.exe, dgLZULrmuWKaOdT1Sm6/uCfR49rYYoxiuZ5LCUD.csHigh entropy of concatenated method names: '.ctor', 'DCxEXyYbrI', 'XxcEGTSK0V', 'PraEQVlwlg', 'l8TEIG1WkL', 'lijETYs2G6', 'CWOELJvshF', 'JLuDxhNLRR', 'hXFDr5thLY', 'Rg4DNM4qh4'
                Source: PI A19T010620.exe, RkxwEbr7JACwwMQIIHE/rgTQcqrXXxHcIy8tpM1.csHigh entropy of concatenated method names: 'I7qRibjELR', 'W6BRRkLJqe', 'dl2Ej5tqJU', 'abqEBoNLYI', '.ctor', 'aSLE3h2U0u', 'vHHEMB67O8', 'H1YEqq4EKu', 'jreEKTWqpU', 'uEXEO4pZvM'
                Source: PI A19T010620.exe, NUZc1Crn81b9G1ahWxW/UVbD3jry0OlPt602ZaR.csHigh entropy of concatenated method names: 'WDR0P6mAyc', 'eol09MtJW7', 'sMy0kOufaN', 'n1U0HwiesF', 'E2p0GlVPO4', 'yjQ0hjipAw', 'HEI0Ig1B9V', 'VTu0f62wXR', '.ctor', 'mEp0pjyfML'
                Source: PI A19T010620.exe, XIwMhbrAEW6dqcU9Cj1/guwq8LrV67Y8PFpNt5L.csHigh entropy of concatenated method names: '.ctor', 'vko0smhv64', 'jDC0y7ETje', 'qTS0Rn1ccn', 'VMo0eF7TS2', 'DXA0uRwIvv', 'T6E0ATmF16', 'jF706ReZWk', 'JMS0CqxqGb', 'Rxk0J1Rj3c'
                Source: PI A19T010620.exe, pGermbr5ZYCZGnNefvA/gClXGfrOj3kV5vBfNDC.csHigh entropy of concatenated method names: '.ctor', 'Xpj7s4HSJA', 'C6Y7yGakOJ', 'D6Y7eoC1b0', 'LJK7ufGTx9', 'Aov72bYYYj', 't7A7WnZRHW', 'hqQ70XUEKD', 'AxM76aHXsB', 'MjJ7cai5tb'
                Source: PI A19T010620.exe, bi8x5BfREGbu6QHotYg/XGdHu4fZ59d9TKs1CmV.csHigh entropy of concatenated method names: 'JjgHmCSSkB', 'kwcHaa9f4B', 'cZLHofdhqw', 'GSvHnv8L7u', '.ctor', 'wLfHF8912W', 'zQ3HjT9X1f', 'OnPaint', 'iJEHlI8Clf', 'aiRHZhFp4C'
                Source: PI A19T010620.exe, YiSXmbfcaFtycZ7kQX6/OigaMtfQa4nBvkAhu4r.csHigh entropy of concatenated method names: 'q66HWqoUHQ', 'VSjH7eaA5S', '.ctor', 'bH3HNELu9G', 'zXVHYTTSWe', 'rl7HVp5eru', 'EtJHsJYa0Z', 'pIqHyKv1R7', 'Pt3HRkhtmI', 'WaCHeYiJom'
                Source: PI A19T010620.exe, TpWq3UfMfnxjPHZRCZ6/Y5ODgWfWVXome0jtyPH.csHigh entropy of concatenated method names: 'gxXkakvtOt', 'vnyk5xjxlH', 'toakjWnU3f', 'W5CkBALqrs', 'K2MkZMcSjl', 'f6ukSg7FdK', 'jmfkn8ex1l', 'lJnkwfnWRA', 'iI8ktUgldd', 'zeskdbGu66'
                Source: PI A19T010620.exe, kEyPnmr2d7OYWIbJeby/FwbwbtrpF53Pofe6FFY.csHigh entropy of concatenated method names: 'xty3sDdTuS', 'phx3yv9cHq', 'BBE3ew4yry', 'f0U3u3U7Ml', 'LJk327xYOo', 'Cah3WfT29I', 'EvQ3rI6xGT', 'IWc3gAaSmT', 'Qu63N59umH', 'w6f3Yb2TSx'
                Source: PI A19T010620.exe, KmCTf3r14i9sSqxs5ok/RFJlX4rFCGp00pxrbq5.csHigh entropy of concatenated method names: 'ENfbbMVXwb', 'FT8b39xxZA', 'g3Jbq98J7g', 'ss6bKcYE0R', 'MkAbmQZPdq', 'm1UbauiVcU', 'bPPbFKRcMg', 'R9SbjsB64M', 'J52bAaGhjr', 'n1yb26oujT'
                Source: PI A19T010620.exe, iMW8vPrqMl8WDQWgJ9A/oCFkMergQS9qeMrer0U.csHigh entropy of concatenated method names: 'OH28XNSL72', 'LcI8GgqfjE', '.ctor', 'eyX8opLiWD', 'HPL8nuCo8w', 'SWs8w6vIwt', 'OnMouseDown', 'OnMouseMove', 'OnPaint', 'SRZ845cUwy'
                Source: PI A19T010620.exe, hVrypICD3dKwNjRx0R/gT3MKQojXMG6Y14VVb.csHigh entropy of concatenated method names: '.ctor', 'OnHandleCreated', 'Li5AUvQ9AB', 'up9Ak4RtFG', 'NZpAXjQFFv', 'xpUAGSVoew', 'OQjAQIgu3Z', 'vQVAIrq1L4', 'SHSATSYNkR', 'lq2ALgYx85'
                Source: PI A19T010620.exe, aN1xgRIeguNOCCxGYW/hb6Edgs3ZK9pk3sKD0.csHigh entropy of concatenated method names: '.ctor', 'rtruKfZRku', 'n7buOVOIHC', 'NmjumfTI8V', 'CmduaYW1GS', 'COBuBsgZUP', 'h0mulW4AHG', 'aOguS1ZexY', 'DoSuoxoxau', 'FGkuwG6QKU'
                Source: PI A19T010620.exe, G28btxL2EwLJFwx0r8/QGT5AYt9aIGex0H6wT.csHigh entropy of concatenated method names: '.ctor', 'V8IuEeSqov', 'm29uDDk3sH', 'OnPaint', 'OnMouseDown', 'OnMouseUp', 'OnMouseMove', 'l3KuJEooM0', 'B8jAkrjRpPIqSxcqy67', 'NH4c2EjFCuPr8BvWYQf'
                Source: PI A19T010620.exe, TEkNgZcUfBqO9Le63S/nEMEqKQewpKDHOrAgx.csHigh entropy of concatenated method names: 'g3Tr5vkJ0A', 'qKOrFWwxkO', '.ctor', 'L66rBS2Pfk', 'OtTrl7aiLS', 'EdLrOXagcO', 'OnMouseDown', 'OnMouseUp', 'OnMouseMove', 'p0Srm0BxSd'
                Source: PI A19T010620.exe, NUnIEOMICypYa3yhqO/cawnI9WcjvtCcZ3KK3.csHigh entropy of concatenated method names: 'GDArYmB7VU', 'zLsrV9Di08', 'tnMrWT2ZdO', 'qFtr7Vy7m7', 'p6Jr6uXNvV', 'DFprCOw4m6', 'iHarJKqRgA', 'kVIrEqaoaO', 'yfBryFBRje', 'K7NrR0FDQj'
                Source: PI A19T010620.exe, Pw4Elpruj1J0ryNiqmR/eLOH4Wra2T7nKIsxccX.csHigh entropy of concatenated method names: '.ctor', 'BG9JTX2HT2', 'vOaJLWY6WS', 'C6PExCoZtX', 'KA9ErClN0b', 'we7ENCbGKU', 'EdZEYRjPrC', 'DKxEssTq0J', 'JuREyyqOCG', 'RMPEerLJ5x'
                Source: PI A19T010620.exe, kNfBiUrRaRf74rnsNbO/UU4y2BrZ7c6P9sSdMgw.csHigh entropy of concatenated method names: 'OnCreateControl', '.ctor', 'HWvRPl9u8G', 'O46RzYXQ3I', 'obuJgB4lR2', 'yeZJNYnT7O', 'u8nJV5FrBu', 'j6vJsshkMF', 'aNkJRl4dBM', 'H5GJeKdLBH'
                Source: PI A19T010620.exe, qubwQ6rcbJMrGc1sOxJ/SkH5jurQLSsxbSqi9hL.csHigh entropy of concatenated method names: 'TbNc7ig1MF', 'zO1c0ha4qP', 'fsacC0Pcl7', 'EoQccyyh7i', 'tL3cEvC8PO', 'U5icDNELVf', 'AIYc1M0ExY', 'zCBcvSnA1F', 'pLIcbCAQkB', 'ucsc3oyCwH'
                Source: PI A19T010620.exe, svq7VgrI8LVFXr081V8/I5rFJBrs505ZlL8i0bt.csHigh entropy of concatenated method names: '.ctor', 'NR6mks7Zh0', 'VDkmHjvBZA', 'HrAKBdCR9n', 'f76Kl0a64p', 'rlgKS2ulyf', 'KikKoAAWSR', 'x08Kwsyc5C', 'TfMK44UjXT', 'zONKdT49Ia'
                Source: PI A19T010620.exe, f90E96rfJxwLZHVoEPb/efnfIWrrDCJji1QdFyb.csHigh entropy of concatenated method names: '.ctor', 'KN2WAEN3vS', 'dn8WWLvPXQ', 'jdPW0yxwYU', 'iLPWCVS0vV', 'OhMWJ3Au8Y', 'km2WDIulHh', 'RI1W1jOxTy', 'vOmW8WO7QM', 'Fl0W30utgX'
                Source: PI A19T010620.exe, UfqD1SrxNbvZ05hIZa7/ARlN3UzOvIPQnyOItU.csHigh entropy of concatenated method names: '.ctor', 'pJi2phvde9', 'GcF2PEk3Pb', 'nfw2UbFAmo', 'JQX2k2y7ii', 'mbe2XvvCEh', 'HVJ2GTUnra', 'V9l2QUdtcr', 'Dly2IoBkV3', 'OyZ2TDZk7B'
                Source: PI A19T010620.exe, kPcEgIDe3LcBgmnfa5/dXcJw5eSqWyl8tPiJi.csHigh entropy of concatenated method names: '.ctor', 'OnHandleCreated', 'Ls32Ojy9iI', 'lJR2mAoQs7', 'pUs25qSDXh', 'dYg2Fo4aeu', 'nDr2BWPv9S', 'sGY2lSlllY', 'OnPaint', 'b2h2K3GYVA'
                Source: PI A19T010620.exe, YKJXoTfbHjPS3dRvVt6/mcvm7KfBQUKbHVxkAFV.csHigh entropy of concatenated method names: '.ctor', 'OnCreateControl', 'lJZYguTP0G', 'dclYQ9r6tt', 'h3qUyA812C', 'SNhURYefJP', 'UAKpJJFvOw', 'DgSpEri2qO', 'get_Text', 'set_Text'
                Source: PI A19T010620.exe, bWA67Dr4PGODkKsd3MA/bUsS7jrlvrsGYOTa8M5.csHigh entropy of concatenated method names: '.ctor', 'qVNia6nAep', 'qGGi5iJv30', 'jN2icLaeIv', 'RLLiJBQSCJ', 'h4FiDfol6x', 'o4jiiwEG0x', 'BZ5ivHJuIe', 'lfCi8tATjl', 'qUvi3lvD10'
                Source: PI A19T010620.exe, zdSQLjrvUJvfCm6EFaO/l0ZKpJrNRNrVNwNwHSr.csHigh entropy of concatenated method names: '.ctor', 'dufiR30NTt', 'rKkieFe9Yi', 'OnPaint', 'OnMouseDown', 'OnMouseUp', 'OnMouseMove', 'KMEiyfyeMx', 'b79IRRc5paqTB2uqWZt', 'KY73gOcSZKiS6gOvcfg'
                Source: PI A19T010620.exe, w12wEXrHI1LfwKweRMe/xCgFqrrkGtRdSjHU13Y.csHigh entropy of concatenated method names: 'jITDdexouc', 'Do2DpKVrbS', 'BLCDhsWj83', 't13DQxwIdy', '.ctor', 'zvdD9O6Ksy', 'asqDUfoFb8', 'OnPaint', 'su5DHIjcw0', 'rdLDXceVka'
                Source: PI A19T010620.exe, cyEW2dHuBy8hL5yC2Q/kn5UTokeoSM2RDLulu.csHigh entropy of concatenated method names: 'Pt7YEFYEqg', 'SKSYD3oFa2', 'w4oY1yUlyu', 'f9IYvEhVBP', '.ctor', 'Y00YJffUfF', 'OnMouseDown', 'OnMouseUp', 'OnMouseMove', 'fftSewXZri3DHxCbe4X'
                Source: PI A19T010620.exe, Iof4l7j34kf2ZpWd1u/EBEI1AwyoVhee6cf6d.csHigh entropy of concatenated method names: 'sFwNNEy1gw', 'FqNNYXRJ0y', 'HxFNstN2c4', 'awkNyfZE8M', 'NtaNeqqtps', 'm1ENuU223R', 'FNwN2pPIhx', 'gASNWwPVeF', 'T4DN0Qp1WA', 'b5jN6w38aZ'
                Source: PI A19T010620.exe, gqq7jtmClPOY7xenAE/mMa6LFYpUR8VNxv992.csHigh entropy of concatenated method names: 'BMlgnt8y1P', 'zgEgwEpsgC', 'j4Egt7uPlH', 'BAxgdjMkaw', 'NPHgPdc8Dr', 'mo5g9UOhgM', 'rpNgkw92Il', 'HP5gHFuysa', '.ctor', 'mhCgGRS7dN'
                Source: PI A19T010620.exe, qXRYvtfxT7M0Zisbrgg/zdP6jHrzQd6FHBbcjHL.csHigh entropy of concatenated method names: 'Q7fjLrpUyp', 'oXSjzmxRhZ', 'olKBrh9ONL', 'rfiBgmuFsF', 'HYNBYMUeib', 'WxXBVEpR1t', 'V1KByl39DC', 'TLXBRwM5i4', 'hhbBubyRED', 'VYmBAYsYOO'
                Source: PI A19T010620.exe, HcJBW9rDUdG46SufC67/oxTtxCreEXDeoj6A219.csHigh entropy of concatenated method names: '.ctor', 'RMuFbFLrNo', 'vd9F3nnnMa', 'DsTFqJiLk4', 'rLsFKOJ85v', 'oNTFm35ET6', 'fRjFar5jTM', 'SjwFFlQqAJ', 'VE7FjnS1Ux', 't3bFlAyxU7'
                Source: PI A19T010620.exe, aGQlZLr0ZQC5TpkZpkY/fEXDcorGMnmkMNOvVcU.csHigh entropy of concatenated method names: 'wAd8MuhGqf', 'fTk8qFXhU2', '.ctor', 'CaE8iVklRM', 'gQw813j6Bg', 'OnPaint', 'Ghg88gNOGg', 'b1O8bGctSP', 'OnMouseDown', 'OnMouseUp'
                Source: PI A19T010620.exe, XSPbb7rSqXrNKk57Is1/neDe0Ar9B8Z7yr0GeMQ.csHigh entropy of concatenated method names: 'hvU8YNOtL8', 'nlO8VyRDbt', 'hrm8um9yjQ', 'Ap88ATKFFC', 'pxQ8yJaTP5', 'hH38RJiWGG', '.ctor', 'OnPaint', 'OnHandleCreated', 'OnMouseDown'
                Source: PI A19T010620.exe, TKIqKrrJSMCF3cR3jQo/LKUkO1rhSBaXSTYOW8S.csHigh entropy of concatenated method names: 'DxZvko5IWB', 'IhBvHNgmdN', 'YFqvXuSgEY', 'TZ2vG7DILO', 'KMmvhjk0hj', 'KVOvQu6Ubs', 'OcSvIC2KNs', 'IkBvfoMM9y', 'pk7vT1YKaC', 'z4rvLCjGZF'
                Source: PI A19T010620.exe, JHR6bA2WgnHVsNT90J/u7EyJBpHVgGCJbEPLm.csHigh entropy of concatenated method names: '.ctor', 'OnHandleCreated', 'OnPaint', 'OnMouseDown', 'OnMouseUp', 'OnMouseMove', 'CdYuA7YL6P', 'EJ7oxTjTABlJASCTAsJ', 'JtgFALjYuUKJCDebOsE', 'dp0KrQjqGlZci8qEFkl'
                Source: PI A19T010620.exe, Il4lVqqTqsoIm5GUPW/UAFWbpgnQrYo4IBQrD.csHigh entropy of concatenated method names: '.ctor', 'Tw8yUuF6Iu', 'nB3ykpwhgm', 'aHuyXmucbv', 'twRyGW75oA', 'pmeyQOyMte', 'JldyIHEdjB', 'AqHyTEcdaf', 'WdcyLG0Wjt', 'iy5RxNaWpU'
                Source: PI A19T010620.exe, WLhL3j0Po2diqxEOpP/GdvFXVGLJW6fHt5wVR.csHigh entropy of concatenated method names: '.ctor', 'I7qRibjELR', 'W6BRRkLJqe', 'yEtyoZ493S', 'BkDynRtJJu', 'Ya3yjZk8Er', 'AVwyBEXO0y', 'J0eylncwa1', 'A0QyZK8DtM', 'xiaySEm6ik'
                Source: PI A19T010620.exe, cNcgk977VGDMsdmMIV/Md38YDX2AOWwlRTZF3.csHigh entropy of concatenated method names: 'RhTguQbjdu', 'FDlgAgHDfu', 'KTRgWl4BML', 'E9wg7XOyZ7', 'Dvhg6T5Xf5', 'KCJgCEWPCX', 'WsLgJTk1hj', 'W1tgEmwfbW', 'SfTg8b4YqZ', 'oLjgbgUrsN'
                Source: PI A19T010620.exe, iRkBQMuL5IF0wVFbsw/ane5E2aXAHXXyV5qqT.csHigh entropy of concatenated method names: 'Sd4rICgaXe', 'meurfmugKP', 'kdfrT5Vi5o', 'djHrLaZV7U', 'XIarzBp1bQ', 'xCVgxjL4e4', 'BbcgrYDbxk', 'YeRggRW7Sf', 'tbXgNK0OqY', 'S9VgYdeKHk'
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run NXLunJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run NXLunJump to behavior

                Hooking and other Techniques for Hiding and Protection:

                barindex
                Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe:Zone.Identifier read attributes | delete
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion:

                barindex
                Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\PI A19T010620.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9556
                Source: C:\Users\user\Desktop\PI A19T010620.exe TID: 7028Thread sleep time: -46532s >= -30000s
                Source: C:\Users\user\Desktop\PI A19T010620.exe TID: 7092Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe TID: 5864Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe TID: 4940Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\PI A19T010620.exeThread delayed: delay time: 46532
                Source: C:\Users\user\Desktop\PI A19T010620.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeThread delayed: delay time: 922337203685477
                Source: RegSvcs.exe, 00000002.00000002.903304023.0000000005510000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                Source: RegSvcs.exe, 00000002.00000002.903304023.0000000005510000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                Source: RegSvcs.exe, 00000002.00000002.903304023.0000000005510000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                Source: RegSvcs.exe, 00000002.00000002.903548471.0000000005620000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: RegSvcs.exe, 00000002.00000002.903304023.0000000005510000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00695B98 LdrInitializeThunk,
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\PI A19T010620.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Injects a PE file into a foreign processesShow sources
                Source: C:\Users\user\Desktop\PI A19T010620.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
                Modifies the hosts fileShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Writes to foreign memory regionsShow sources
                Source: C:\Users\user\Desktop\PI A19T010620.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
                Source: C:\Users\user\Desktop\PI A19T010620.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
                Source: C:\Users\user\Desktop\PI A19T010620.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 438000
                Source: C:\Users\user\Desktop\PI A19T010620.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43A000
                Source: C:\Users\user\Desktop\PI A19T010620.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 235008
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                Source: RegSvcs.exe, 00000002.00000002.900699207.0000000000D00000.00000002.00000001.sdmpBinary or memory string: Program Manager
                Source: RegSvcs.exe, 00000002.00000002.900699207.0000000000D00000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                Source: RegSvcs.exe, 00000002.00000002.900699207.0000000000D00000.00000002.00000001.sdmpBinary or memory string: Progman
                Source: RegSvcs.exe, 00000002.00000002.900699207.0000000000D00000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Users\user\Desktop\PI A19T010620.exe VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\Desktop\PI A19T010620.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Lowering of HIPS / PFW / Operating System Security Settings:

                barindex
                Modifies the hosts fileShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                Stealing of Sensitive Information:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6464, type: MEMORYSTR
                Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Tries to harvest and steal browser information (history, passwords, etc)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Tries to harvest and steal ftp login credentialsShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Tries to steal Mail credentials (via file access)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: Yara matchFile source: 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6464, type: MEMORYSTR

                Remote Access Functionality:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6464, type: MEMORYSTR

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Registry Run Keys / Startup Folder1Process Injection212File and Directory Permissions Modification1OS Credential Dumping2System Information Discovery114Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Disable or Modify Tools1Credentials in Registry1Query Registry1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerSecurity Software Discovery111SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information21NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing2LSA SecretsVirtualization/Sandbox Evasion131SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion131DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection212Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                PI A19T010620.exe51%VirustotalBrowse
                PI A19T010620.exe51%MetadefenderBrowse
                PI A19T010620.exe79%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                PI A19T010620.exe100%Joe Sandbox ML

                Dropped Files

                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\NXLun\NXLun.exe0%MetadefenderBrowse
                C:\Users\user\AppData\Roaming\NXLun\NXLun.exe0%ReversingLabs

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                2.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                Domains

                SourceDetectionScannerLabelLink
                odessabd.com0%VirustotalBrowse
                mail.odessabd.com1%VirustotalBrowse

                URLs

                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://cps.letsencrypt.org00%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                http://x1.c.lencr.org/00%URL Reputationsafe
                http://x1.i.lencr.org/00%URL Reputationsafe
                http://crl.microsoft.co90%Avira URL Cloudsafe
                http://r3.o.lencr.org00%URL Reputationsafe
                http://mOEDeY.com0%Avira URL Cloudsafe
                https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                http://cps.letsencrypt.o_0%Avira URL Cloudsafe
                http://mail.odessabd.com0%Avira URL Cloudsafe
                http://P02rvktl5O.com0%Avira URL Cloudsafe
                http://odessabd.com0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://api.ipify.org%$0%Avira URL Cloudsafe
                http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                http://r3.i.lencr.org/00%URL Reputationsafe
                https://static.hummingbird.me/anime/poster_images/000/010/716/large/0fd8df1b586e60a0b1591cd8555c072f0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                odessabd.com
                192.185.90.36
                truetrueunknown
                mail.odessabd.com
                unknown
                unknowntrueunknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://DynDns.comDynDNSRegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cnPI A19T010620.exe, 00000000.00000003.638876019.0000000001ADD000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://cps.letsencrypt.org0RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://x1.c.lencr.org/0RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://x1.i.lencr.org/0RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://crl.microsoft.co9RegSvcs.exe, 00000002.00000003.880396544.0000000005619000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://r3.o.lencr.org0RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://mOEDeY.comRegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://api.ipify.org%GETMozilla/5.0RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                low
                http://cps.letsencrypt.o_RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://mail.odessabd.comRegSvcs.exe, 00000002.00000002.901557138.0000000002765000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://i.imgur.com/blkrqBo.gifiThisPI A19T010620.exefalse
                  high
                  http://P02rvktl5O.comRegSvcs.exe, 00000002.00000002.901604014.0000000002788000.00000004.00000001.sdmp, RegSvcs.exe, 00000002.00000002.901542292.000000000275D000.00000004.00000001.sdmp, RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://odessabd.comRegSvcs.exe, 00000002.00000002.901557138.0000000002765000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipRegSvcs.exe, 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://api.ipify.org%$RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://cps.root-x1.letsencrypt.org0RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://r3.i.lencr.org/0RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://static.hummingbird.me/anime/poster_images/000/010/716/large/0fd8df1b586e60a0b1591cd8555c072fPI A19T010620.exefalse
                  • Avira URL Cloud: safe
                  unknown

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  192.185.90.36
                  odessabd.comUnited States
                  46606UNIFIEDLAYER-AS-1UStrue

                  General Information

                  Joe Sandbox Version:33.0.0 White Diamond
                  Analysis ID:458957
                  Start date:03.08.2021
                  Start time:22:48:18
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 8m 20s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:PI A19T010620.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:18
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.adwa.spyw.evad.winEXE@7/6@2/1
                  EGA Information:Failed
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                  • Excluded IPs from analysis (whitelisted): 104.43.139.144, 104.42.151.234, 20.50.102.62, 20.54.110.249, 40.112.88.60, 173.222.108.226, 173.222.108.210, 20.82.210.154, 80.67.82.235, 80.67.82.211, 20.82.209.183
                  • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, skypedataprdcolwus16.cloudapp.net, au-bg-shim.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  22:49:19API Interceptor1x Sleep call for process: PI A19T010620.exe modified
                  22:49:31API Interceptor665x Sleep call for process: RegSvcs.exe modified
                  22:49:42AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run NXLun C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                  22:49:50AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run NXLun C:\Users\user\AppData\Roaming\NXLun\NXLun.exe

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  192.185.90.36PO-K-128 IAN 340854.exeGet hashmaliciousBrowse
                    GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                      GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                        GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                          GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                            GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                              GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                                GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                                  GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                                    GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                                      GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                                        GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                                          GS_ PO NO.1862021.exeGet hashmaliciousBrowse

                                            Domains

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                                            ASN

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            UNIFIEDLAYER-AS-1USPayment_Advice.exeGet hashmaliciousBrowse
                                            • 173.254.28.149
                                            RuVwYj2Jax.exeGet hashmaliciousBrowse
                                            • 192.185.77.139
                                            KkPVouLuOx.exeGet hashmaliciousBrowse
                                            • 67.20.76.71
                                            Nouveau bon de commande. 3007021_pdf.exeGet hashmaliciousBrowse
                                            • 162.241.218.97
                                            wuxvGLNrxG.jarGet hashmaliciousBrowse
                                            • 162.241.216.53
                                            Amaury.vanvinckenroye-AudioMessage_520498.htmGet hashmaliciousBrowse
                                            • 192.185.138.88
                                            transferred $95,934.55 pdf.exeGet hashmaliciousBrowse
                                            • 50.87.146.49
                                            rL3Wx4zKD4.exeGet hashmaliciousBrowse
                                            • 74.220.199.6
                                            hD72Gd3THG.exeGet hashmaliciousBrowse
                                            • 67.20.76.71
                                            Products Order38899999.exeGet hashmaliciousBrowse
                                            • 50.87.146.199
                                            ORDER_0009_PDF.exeGet hashmaliciousBrowse
                                            • 74.220.199.6
                                            WWTLJo3vxn.exeGet hashmaliciousBrowse
                                            • 192.254.235.241
                                            INV. 736392 Scan pdf.exeGet hashmaliciousBrowse
                                            • 192.185.164.148
                                            7nNtjBvhrmGet hashmaliciousBrowse
                                            • 142.7.147.90
                                            Purchase Requirements.exeGet hashmaliciousBrowse
                                            • 192.185.0.218
                                            #Ud83d#Udda8 FaxMail dir -INV 000087.htmlGet hashmaliciousBrowse
                                            • 162.241.217.69
                                            Products Order.exeGet hashmaliciousBrowse
                                            • 50.87.146.199
                                            zerYOlEkZR.exeGet hashmaliciousBrowse
                                            • 192.254.235.241
                                            PO-K-128 IAN 340854.exeGet hashmaliciousBrowse
                                            • 192.185.90.36
                                            csa customers.xlsxGet hashmaliciousBrowse
                                            • 162.241.217.138

                                            JA3 Fingerprints

                                            No context

                                            Dropped Files

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            C:\Users\user\AppData\Roaming\NXLun\NXLun.exeSwift Copy.exeGet hashmaliciousBrowse
                                              SOA.exeGet hashmaliciousBrowse
                                                POSH service quotation.exeGet hashmaliciousBrowse
                                                  SOA.exeGet hashmaliciousBrowse
                                                    epda.exeGet hashmaliciousBrowse
                                                      POSH service quotation..exeGet hashmaliciousBrowse
                                                        SWIFT REF GO 20210730SFT21020137.exeGet hashmaliciousBrowse
                                                          HJKcEjrUuzYMV9X.exeGet hashmaliciousBrowse
                                                            est pda.exeGet hashmaliciousBrowse
                                                              BL COPY.exeGet hashmaliciousBrowse
                                                                DOC.exeGet hashmaliciousBrowse
                                                                  statement.exeGet hashmaliciousBrowse
                                                                    PO-K-128 IAN 340854.exeGet hashmaliciousBrowse
                                                                      PO#4500484210.exeGet hashmaliciousBrowse
                                                                        Invoice no SS21-22185.exeGet hashmaliciousBrowse
                                                                          SQycD6hL4Y.exeGet hashmaliciousBrowse
                                                                            Aggiornamento ordine Quantit#U00e0__BFM Srl 117-28050-01.exeGet hashmaliciousBrowse
                                                                              PAYMENT INSTRUCTIONS COPY.exeGet hashmaliciousBrowse
                                                                                FINAL SHIPPING DOC..exeGet hashmaliciousBrowse
                                                                                  Spare Parts Requisition-003,004.exeGet hashmaliciousBrowse

                                                                                    Created / dropped Files

                                                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NXLun.exe.log
                                                                                    Process:C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:modified
                                                                                    Size (bytes):142
                                                                                    Entropy (8bit):5.090621108356562
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                                                    MD5:8C0458BB9EA02D50565175E38D577E35
                                                                                    SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                                                    SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                                                    SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                                                    Malicious:false
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PI A19T010620.exe.log
                                                                                    Process:C:\Users\user\Desktop\PI A19T010620.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):1314
                                                                                    Entropy (8bit):5.350128552078965
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                                                    MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                                                    SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                                                    SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                                                    SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                                                    Malicious:true
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                                    C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                    File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):45152
                                                                                    Entropy (8bit):6.149629800481177
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:bBbSoy+SdIBf0k2dsYyV6Iq87PiU9FViaLmf:EoOIBf0ddsYy8LUjVBC
                                                                                    MD5:2867A3817C9245F7CF518524DFD18F28
                                                                                    SHA1:D7BA2A111CEDD5BF523224B3F1CFE58EEC7C2FDC
                                                                                    SHA-256:43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                                                                                    SHA-512:7D3D3DBB42B7966644D716AA9CBC75327B2ACB02E43C61F1DAD4AFE5521F9FE248B33347DFE15B637FB33EB97CDB322BCAEAE08BAE3F2FD863A9AD9B3A4D6B42
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Joe Sandbox View:
                                                                                    • Filename: Swift Copy.exe, Detection: malicious, Browse
                                                                                    • Filename: SOA.exe, Detection: malicious, Browse
                                                                                    • Filename: POSH service quotation.exe, Detection: malicious, Browse
                                                                                    • Filename: SOA.exe, Detection: malicious, Browse
                                                                                    • Filename: epda.exe, Detection: malicious, Browse
                                                                                    • Filename: POSH service quotation..exe, Detection: malicious, Browse
                                                                                    • Filename: SWIFT REF GO 20210730SFT21020137.exe, Detection: malicious, Browse
                                                                                    • Filename: HJKcEjrUuzYMV9X.exe, Detection: malicious, Browse
                                                                                    • Filename: est pda.exe, Detection: malicious, Browse
                                                                                    • Filename: BL COPY.exe, Detection: malicious, Browse
                                                                                    • Filename: DOC.exe, Detection: malicious, Browse
                                                                                    • Filename: statement.exe, Detection: malicious, Browse
                                                                                    • Filename: PO-K-128 IAN 340854.exe, Detection: malicious, Browse
                                                                                    • Filename: PO#4500484210.exe, Detection: malicious, Browse
                                                                                    • Filename: Invoice no SS21-22185.exe, Detection: malicious, Browse
                                                                                    • Filename: SQycD6hL4Y.exe, Detection: malicious, Browse
                                                                                    • Filename: Aggiornamento ordine Quantit#U00e0__BFM Srl 117-28050-01.exe, Detection: malicious, Browse
                                                                                    • Filename: PAYMENT INSTRUCTIONS COPY.exe, Detection: malicious, Browse
                                                                                    • Filename: FINAL SHIPPING DOC..exe, Detection: malicious, Browse
                                                                                    • Filename: Spare Parts Requisition-003,004.exe, Detection: malicious, Browse
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...zX.Z..............0..d..........V.... ........@.. ..............................."....`.....................................O.......8............r..`>.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                                                    C:\Windows\System32\drivers\etc\hosts
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:modified
                                                                                    Size (bytes):11
                                                                                    Entropy (8bit):2.663532754804255
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:iLE:iLE
                                                                                    MD5:B24D295C1F84ECBFB566103374FB91C5
                                                                                    SHA1:6A750D3F8B45C240637332071D34B403FA1FF55A
                                                                                    SHA-256:4DC7B65075FBC5B5421551F0CB814CAFDC8CACA5957D393C222EE388B6F405F4
                                                                                    SHA-512:9BE279BFA70A859608B50EF5D30BF2345F334E5F433C410EA6A188DCAB395BFF50C95B165177E59A29261464871C11F903A9ECE55B2D900FE49A9F3C49EB88FA
                                                                                    Malicious:true
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview: ..127.0.0.1
                                                                                    \Device\ConDrv
                                                                                    Process:C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):1141
                                                                                    Entropy (8bit):4.44831826838854
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:zKLXkb4DObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0b4DQntKKH1MqJC
                                                                                    MD5:1AEB3A784552CFD2AEDEDC1D43A97A4F
                                                                                    SHA1:804286AB9F8B3DE053222826A69A7CDA3492411A
                                                                                    SHA-256:0BC438F4B1208E1390C12D375B6CBB08BF47599D1F24BD07799BB1DF384AA293
                                                                                    SHA-512:5305059BA86D5C2185E590EC036044B2A17ED9FD9863C2E3C7E7D8035EF0C79E53357AF5AE735F7D432BC70156D4BD3ACB42D100CFB05C2FB669EA22368F1415
                                                                                    Malicious:false
                                                                                    Preview: Microsoft (R) .NET Framework Services Installation Utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c

                                                                                    Static File Info

                                                                                    General

                                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Entropy (8bit):6.916784541748945
                                                                                    TrID:
                                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                    • Windows Screen Saver (13104/52) 0.07%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                    File name:PI A19T010620.exe
                                                                                    File size:1141760
                                                                                    MD5:62aaab0942211b9d11a7755d1970adfd
                                                                                    SHA1:2703f7f409aeb01b0d68e83f336241f4b7923532
                                                                                    SHA256:23e9628689de5cffc14abcc1d39a259f54bde8e50304af29d4e127359163e1c4
                                                                                    SHA512:c408ae66a98fa70b14f2e3527078bd7b1bca862b7f071efdf78caa7fb8b7d82c6de78a088981bda1d48f30034063488fe8094f3e39aedeecdb194755667f13a9
                                                                                    SSDEEP:24576:YP9ZVh8b4lyJE84wq/dExJaK6ptDPgfqNE5D6+fVahiLXXFM:cNgJaK6LI5+8VFLXV
                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a.................b............... ........@.. ....................................@................................

                                                                                    File Icon

                                                                                    Icon Hash:00828e8e8686b000

                                                                                    Static PE Info

                                                                                    General

                                                                                    Entrypoint:0x5180de
                                                                                    Entrypoint Section:.text
                                                                                    Digitally signed:false
                                                                                    Imagebase:0x400000
                                                                                    Subsystem:windows gui
                                                                                    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                    Time Stamp:0x6101FAD1 [Thu Jul 29 00:48:17 2021 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:v4.0.30319
                                                                                    OS Version Major:4
                                                                                    OS Version Minor:0
                                                                                    File Version Major:4
                                                                                    File Version Minor:0
                                                                                    Subsystem Version Major:4
                                                                                    Subsystem Version Minor:0
                                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                    Entrypoint Preview

                                                                                    Instruction
                                                                                    jmp dword ptr [00402000h]
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al

                                                                                    Data Directories

                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x1180900x4b.text
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x11a0000x5fc.rsrc
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x11c0000xc.reloc
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                    Sections

                                                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    .text0x20000x1160e40x116200False0.619296875data6.92181951931IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                    .rsrc0x11a0000x5fc0x600False0.435546875data4.20979745482IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .reloc0x11c0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                    Resources

                                                                                    NameRVASizeTypeLanguageCountry
                                                                                    RT_VERSION0x11a0a00x370data
                                                                                    RT_MANIFEST0x11a4100x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                    Imports

                                                                                    DLLImport
                                                                                    mscoree.dll_CorExeMain

                                                                                    Version Infos

                                                                                    DescriptionData
                                                                                    Translation0x0000 0x04b0
                                                                                    LegalCopyrightCopyright Microsoft 2014
                                                                                    Assembly Version1.0.0.0
                                                                                    InternalNameCompletionActionInvok.exe
                                                                                    FileVersion1.0.0.0
                                                                                    CompanyNameMicrosoft
                                                                                    LegalTrademarks
                                                                                    Comments
                                                                                    ProductNameQManager
                                                                                    ProductVersion1.0.0.0
                                                                                    FileDescriptionQManager
                                                                                    OriginalFilenameCompletionActionInvok.exe

                                                                                    Network Behavior

                                                                                    Network Port Distribution

                                                                                    TCP Packets

                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Aug 3, 2021 22:50:58.705452919 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:58.839899063 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:58.840009928 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.108015060 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.108342886 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.243237972 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.243637085 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.384365082 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.439254045 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.451309919 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.595920086 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.595977068 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.596014023 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.596040964 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.596637011 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.596685886 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.597628117 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.608211994 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.743293047 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.798686028 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.008275032 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.142954111 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.145447016 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.280286074 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.280983925 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.423499107 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.425215960 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.559804916 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.560584068 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.696851969 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.697652102 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.831949949 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.832972050 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.833107948 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.833786964 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.833913088 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.967287064 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.967323065 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.967832088 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.967968941 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.968539000 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:01.017597914 CEST49774587192.168.2.4192.185.90.36

                                                                                    UDP Packets

                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Aug 3, 2021 22:48:55.291927099 CEST5309753192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:48:55.316600084 CEST53530978.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:48:56.142010927 CEST4925753192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:48:56.169701099 CEST53492578.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:48:57.428899050 CEST6238953192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:48:57.456579924 CEST53623898.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:48:58.600797892 CEST4991053192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:48:58.625504017 CEST53499108.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:48:59.775897980 CEST5585453192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:48:59.804531097 CEST53558548.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:00.779062986 CEST6454953192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:00.810673952 CEST53645498.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:01.825337887 CEST6315353192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:01.864815950 CEST53631538.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:02.651316881 CEST5299153192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:02.676393032 CEST53529918.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:04.580542088 CEST5370053192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:04.606900930 CEST53537008.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:05.499711037 CEST5172653192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:05.524569988 CEST53517268.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:07.254586935 CEST5679453192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:07.285353899 CEST53567948.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:08.246965885 CEST5653453192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:08.279789925 CEST53565348.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:09.071966887 CEST5662753192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:09.104526043 CEST53566278.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:09.863805056 CEST5662153192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:09.888432026 CEST53566218.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:10.741626978 CEST6311653192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:10.769108057 CEST53631168.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:11.963576078 CEST6407853192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:11.991105080 CEST53640788.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:12.784796000 CEST6480153192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:12.809787989 CEST53648018.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:13.806740999 CEST6172153192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:13.834670067 CEST53617218.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:23.310261965 CEST5125553192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:23.343287945 CEST53512558.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:38.913350105 CEST6152253192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:38.970431089 CEST53615228.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:39.447201014 CEST5233753192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:39.518754959 CEST53523378.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:39.874074936 CEST5504653192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:39.915977001 CEST53550468.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:40.031755924 CEST4961253192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:40.066987991 CEST53496128.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:40.411207914 CEST4928553192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:40.445420980 CEST53492858.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:40.962791920 CEST5060153192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:40.995408058 CEST53506018.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:41.361728907 CEST6087553192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:41.386887074 CEST53608758.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:41.834672928 CEST5644853192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:41.867868900 CEST53564488.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:42.532402992 CEST5917253192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:42.560165882 CEST53591728.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:43.980654001 CEST6242053192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:44.013119936 CEST53624208.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:44.384948969 CEST6057953192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:44.418787956 CEST53605798.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:48.786755085 CEST5018353192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:48.823900938 CEST53501838.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:57.782505989 CEST6153153192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:57.817826986 CEST53615318.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:57.967566013 CEST4922853192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:58.000004053 CEST53492288.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:50:00.768184900 CEST5979453192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:50:00.802253008 CEST53597948.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:50:32.038742065 CEST5591653192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:50:32.084148884 CEST53559168.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:50:33.875883102 CEST5275253192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:50:33.917068005 CEST53527528.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:50:58.386392117 CEST6054253192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:50:58.556462049 CEST53605428.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:50:58.574436903 CEST6068953192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:50:58.609914064 CEST53606898.8.8.8192.168.2.4

                                                                                    DNS Queries

                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                    Aug 3, 2021 22:50:58.386392117 CEST192.168.2.48.8.8.80x5dfaStandard query (0)mail.odessabd.comA (IP address)IN (0x0001)
                                                                                    Aug 3, 2021 22:50:58.574436903 CEST192.168.2.48.8.8.80xfa23Standard query (0)mail.odessabd.comA (IP address)IN (0x0001)

                                                                                    DNS Answers

                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                    Aug 3, 2021 22:50:58.556462049 CEST8.8.8.8192.168.2.40x5dfaNo error (0)mail.odessabd.comodessabd.comCNAME (Canonical name)IN (0x0001)
                                                                                    Aug 3, 2021 22:50:58.556462049 CEST8.8.8.8192.168.2.40x5dfaNo error (0)odessabd.com192.185.90.36A (IP address)IN (0x0001)
                                                                                    Aug 3, 2021 22:50:58.609914064 CEST8.8.8.8192.168.2.40xfa23No error (0)mail.odessabd.comodessabd.comCNAME (Canonical name)IN (0x0001)
                                                                                    Aug 3, 2021 22:50:58.609914064 CEST8.8.8.8192.168.2.40xfa23No error (0)odessabd.com192.185.90.36A (IP address)IN (0x0001)

                                                                                    SMTP Packets

                                                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                                                    Aug 3, 2021 22:50:59.108015060 CEST58749774192.185.90.36192.168.2.4220-lasalle.websitewelcome.com ESMTP Exim 4.94.2 #2 Tue, 03 Aug 2021 15:50:59 -0500
                                                                                    220-We do not authorize the use of this system to transport unsolicited,
                                                                                    220 and/or bulk e-mail.
                                                                                    Aug 3, 2021 22:50:59.108342886 CEST49774587192.168.2.4192.185.90.36EHLO 932923
                                                                                    Aug 3, 2021 22:50:59.243237972 CEST58749774192.185.90.36192.168.2.4250-lasalle.websitewelcome.com Hello 932923 [84.17.52.25]
                                                                                    250-SIZE 52428800
                                                                                    250-8BITMIME
                                                                                    250-PIPELINING
                                                                                    250-PIPE_CONNECT
                                                                                    250-AUTH PLAIN LOGIN
                                                                                    250-STARTTLS
                                                                                    250 HELP
                                                                                    Aug 3, 2021 22:50:59.243637085 CEST49774587192.168.2.4192.185.90.36STARTTLS
                                                                                    Aug 3, 2021 22:50:59.384365082 CEST58749774192.185.90.36192.168.2.4220 TLS go ahead

                                                                                    Code Manipulations

                                                                                    Statistics

                                                                                    Behavior

                                                                                    Click to jump to process

                                                                                    System Behavior

                                                                                    General

                                                                                    Start time:22:49:00
                                                                                    Start date:03/08/2021
                                                                                    Path:C:\Users\user\Desktop\PI A19T010620.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:'C:\Users\user\Desktop\PI A19T010620.exe'
                                                                                    Imagebase:0xff0000
                                                                                    File size:1141760 bytes
                                                                                    MD5 hash:62AAAB0942211B9D11A7755D1970ADFD
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:.Net C# or VB.NET
                                                                                    Reputation:low

                                                                                    General

                                                                                    Start time:22:49:19
                                                                                    Start date:03/08/2021
                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                    Imagebase:0x30000
                                                                                    File size:45152 bytes
                                                                                    MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:.Net C# or VB.NET
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    Reputation:high

                                                                                    General

                                                                                    Start time:22:49:50
                                                                                    Start date:03/08/2021
                                                                                    Path:C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe'
                                                                                    Imagebase:0x1b0000
                                                                                    File size:45152 bytes
                                                                                    MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:.Net C# or VB.NET
                                                                                    Antivirus matches:
                                                                                    • Detection: 0%, Metadefender, Browse
                                                                                    • Detection: 0%, ReversingLabs
                                                                                    Reputation:high

                                                                                    General

                                                                                    Start time:22:49:51
                                                                                    Start date:03/08/2021
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff724c50000
                                                                                    File size:625664 bytes
                                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high

                                                                                    General

                                                                                    Start time:22:49:58
                                                                                    Start date:03/08/2021
                                                                                    Path:C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe'
                                                                                    Imagebase:0xab0000
                                                                                    File size:45152 bytes
                                                                                    MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:.Net C# or VB.NET
                                                                                    Reputation:high

                                                                                    General

                                                                                    Start time:22:49:59
                                                                                    Start date:03/08/2021
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff724c50000
                                                                                    File size:625664 bytes
                                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high

                                                                                    Disassembly

                                                                                    Code Analysis

                                                                                    Reset < >