Loading ...

Play interactive tourEdit tour

Windows Analysis Report 10377 APT800_B0205K0384.exe

Overview

General Information

Sample Name:10377 APT800_B0205K0384.exe
Analysis ID:492186
MD5:4f0f86315b42b8dad8a1b430d5ac084a
SHA1:e50192512d5cf87ece05a1b3974fccc652eff93b
SHA256:8222127c77b4f83832246e9ce96da7741f1352da9d3548ad8b959b2e00b54c0d
Tags:exenanocore
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large strings
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • 10377 APT800_B0205K0384.exe (PID: 5960 cmdline: 'C:\Users\user\Desktop\10377 APT800_B0205K0384.exe' MD5: 4F0F86315B42B8DAD8A1B430D5AC084A)
    • schtasks.exe (PID: 5168 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xErAccEJcQLD' /XML 'C:\Users\user\AppData\Local\Temp\tmp1570.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 1904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "9358a53f-433c-42f5-bd3f-14ae4da5", "Group": "Mine", "Domain1": "mec.sytes.net", "Domain2": "mec.sytes.net", "Port": 3259, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xf7ad:$x1: NanoCore.ClientPluginHost
  • 0xf7da:$x2: IClientNetworkHost
00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xf7ad:$x2: NanoCore.ClientPluginHost
  • 0x10888:$s4: PipeCreated
  • 0xf7c7:$s5: IClientLoggingHost
00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000007.00000002.930218155.0000000005200000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    00000007.00000002.930218155.0000000005200000.00000004.00020000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    Click to see the 15 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    7.2.10377 APT800_B0205K0384.exe.5620000.7.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xf7ad:$x1: NanoCore.ClientPluginHost
    • 0xf7da:$x2: IClientNetworkHost
    7.2.10377 APT800_B0205K0384.exe.5620000.7.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xf7ad:$x2: NanoCore.ClientPluginHost
    • 0x10888:$s4: PipeCreated
    • 0xf7c7:$s5: IClientLoggingHost
    7.2.10377 APT800_B0205K0384.exe.5620000.7.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      7.2.10377 APT800_B0205K0384.exe.5620000.7.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      7.2.10377 APT800_B0205K0384.exe.5620000.7.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xd9ad:$x2: NanoCore.ClientPluginHost
      • 0xea88:$s4: PipeCreated
      • 0xd9c7:$s5: IClientLoggingHost
      Click to see the 35 entries

      Sigma Overview

      AV Detection:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe, ProcessId: 3484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe, ProcessId: 3484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Stealing of Sensitive Information:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe, ProcessId: 3484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe, ProcessId: 3484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000007.00000002.929668288.0000000003F17000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "9358a53f-433c-42f5-bd3f-14ae4da5", "Group": "Mine", "Domain1": "mec.sytes.net", "Domain2": "mec.sytes.net", "Port": 3259, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Multi AV Scanner detection for submitted fileShow sources
      Source: 10377 APT800_B0205K0384.exeVirustotal: Detection: 23%Perma Link
      Source: 10377 APT800_B0205K0384.exeReversingLabs: Detection: 26%
      Multi AV Scanner detection for domain / URLShow sources
      Source: mec.sytes.netVirustotal: Detection: 6%Perma Link
      Source: mec.sytes.netVirustotal: Detection: 6%Perma Link
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\xErAccEJcQLD.exeReversingLabs: Detection: 26%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.5620000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.5620000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.5624629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f1e3d4.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f1e3d4.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f229fd.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.10377 APT800_B0205K0384.exe.3c8d590.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f1959e.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.713144984.00000000039D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.927919186.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.929668288.0000000003F17000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 5960, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 3484, type: MEMORYSTR
      Machine Learning detection for sampleShow sources
      Source: 10377 APT800_B0205K0384.exeJoe Sandbox ML: detected
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\xErAccEJcQLD.exeJoe Sandbox ML: detected
      Source: 7.2.10377 APT800_B0205K0384.exe.5620000.7.unpackAvira: Label: TR/NanoCore.fadte
      Source: 7.2.10377 APT800_B0205K0384.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10377 APT800_B0205K0384.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: 10377 APT800_B0205K0384.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: mec.sytes.net
      Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
      Source: global trafficTCP traffic: 192.168.2.4:49769 -> 194.5.97.210:3259
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
      Source: 10377 APT800_B0205K0384.exeString found in binary or memory: http://tempuri.org/educrossDataSet.xsd
      Source: 10377 APT800_B0205K0384.exeString found in binary or memory: http://tempuri.org/educrossDataSet1.xsd
      Source: 10377 APT800_B0205K0384.exeString found in binary or memory: http://tempuri.org/educrossDataSet2.xsd
      Source: 10377 APT800_B0205K0384.exeString found in binary or memory: http://tempuri.org/educrossDataSet3.xsd
      Source: 10377 APT800_B0205K0384.exeString found in binary or memory: http://tempuri.org/educrossDataSet4.xsd
      Source: 10377 APT800_B0205K0384.exeString found in binary or memory: http://tempuri.org/educrossDataSet5.xsd
      Source: 10377 APT800_B0205K0384.exeString found in binary or memory: http://tempuri.org/educrossDataSet6.xsd
      Source: 10377 APT800_B0205K0384.exeString found in binary or memory: http://tempuri.org/educrossDataSet7.xsd
      Source: 10377 APT800_B0205K0384.exeString found in binary or memory: http://tempuri.org/educrossDataSet8.xsd
      Source: 10377 APT800_B0205K0384.exeString found in binary or memory: http://tempuri.org/educrossDataSet9.xsd
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.668065555.00000000051E6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.668696632.00000000051BE000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.htmlt
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.709575017.00000000051BE000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comase
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.709575017.00000000051BE000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.commeta4
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.709575017.00000000051BE000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.como
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.663769191.00000000051BB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.665144024.00000000051AE000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/v:
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.664841177.00000000051A5000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnopoJ
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.664956704.00000000051A6000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cns-cN
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmp, 10377 APT800_B0205K0384.exe, 00000000.00000002.717203972.00000000051A0000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.666946127.00000000051C3000.00000004.00000001.sdmp, 10377 APT800_B0205K0384.exe, 00000000.00000003.666651887.00000000051C3000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.666946127.00000000051C3000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/(=
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.666491209.00000000051C3000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/4
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.666166391.00000000051BB000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/H?
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.666166391.00000000051BB000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/K
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.666651887.00000000051C3000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.666651887.00000000051C3000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0l
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.666421425.00000000051C3000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0s4
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.666946127.00000000051C3000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.666651887.00000000051C3000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/n
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.666166391.00000000051BB000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/pt-b
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000003.666491209.00000000051C3000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/xI
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: unknownDNS traffic detected: queries for: mec.sytes.net
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.710684503.0000000000918000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
      Source: 10377 APT800_B0205K0384.exe, 00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.5620000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.5620000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.5624629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f1e3d4.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f1e3d4.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f229fd.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.10377 APT800_B0205K0384.exe.3c8d590.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f1959e.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.713144984.00000000039D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.927919186.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.929668288.0000000003F17000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 5960, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 3484, type: MEMORYSTR

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 7.2.10377 APT800_B0205K0384.exe.5620000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.10377 APT800_B0205K0384.exe.5620000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.10377 APT800_B0205K0384.exe.5624629.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.10377 APT800_B0205K0384.exe.5200000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.10377 APT800_B0205K0384.exe.2ee166c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.10377 APT800_B0205K0384.exe.3f1e3d4.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.10377 APT800_B0205K0384.exe.3f1e3d4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.10377 APT800_B0205K0384.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.10377 APT800_B0205K0384.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.10377 APT800_B0205K0384.exe.3f229fd.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.10377 APT800_B0205K0384.exe.3c8d590.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.10377 APT800_B0205K0384.exe.3c8d590.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.10377 APT800_B0205K0384.exe.3f1959e.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.10377 APT800_B0205K0384.exe.3f1959e.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000002.930218155.0000000005200000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.713144984.00000000039D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.713144984.00000000039D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.927919186.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000002.927919186.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.929668288.0000000003F17000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 5960, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 5960, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 3484, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 3484, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      .NET source code contains very large stringsShow sources
      Source: 10377 APT800_B0205K0384.exe, facreg.csLong String: Length: 217893
      Source: 10377 APT800_B0205K0384.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 7.2.10377 APT800_B0205K0384.exe.5620000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.10377 APT800_B0205K0384.exe.5620000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.10377 APT800_B0205K0384.exe.5620000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.10377 APT800_B0205K0384.exe.5620000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.10377 APT800_B0205K0384.exe.5624629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.10377 APT800_B0205K0384.exe.5624629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.10377 APT800_B0205K0384.exe.5200000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.10377 APT800_B0205K0384.exe.5200000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.10377 APT800_B0205K0384.exe.2ee166c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.10377 APT800_B0205K0384.exe.2ee166c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.10377 APT800_B0205K0384.exe.3f1e3d4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.10377 APT800_B0205K0384.exe.3f1e3d4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.10377 APT800_B0205K0384.exe.3f1e3d4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.10377 APT800_B0205K0384.exe.3f1e3d4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.10377 APT800_B0205K0384.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.10377 APT800_B0205K0384.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.10377 APT800_B0205K0384.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.10377 APT800_B0205K0384.exe.3f229fd.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.10377 APT800_B0205K0384.exe.3f229fd.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.10377 APT800_B0205K0384.exe.3c8d590.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.10377 APT800_B0205K0384.exe.3c8d590.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.10377 APT800_B0205K0384.exe.3f1959e.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.10377 APT800_B0205K0384.exe.3f1959e.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.10377 APT800_B0205K0384.exe.3f1959e.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000007.00000002.930218155.0000000005200000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.930218155.0000000005200000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.713144984.00000000039D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.713144984.00000000039D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.927919186.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.927919186.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.929668288.0000000003F17000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 5960, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 5960, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 3484, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 3484, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_02551CF8
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_025578E0
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_025505B0
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_02557634
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_02557638
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_02558BF9
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_025578DB
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_02551CEF
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_025505AB
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D58AB0
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D526A0
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D53A69
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D50239
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D50970
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D53510
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D51D33
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D562F9
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D58AA0
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D55608
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D553C0
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D557C0
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D553B0
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D58F68
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D541DB
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D555F9
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D541E0
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D55199
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D5D180
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D521A8
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D551A8
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D53501
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_02B523A0
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_02B52FA8
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_02B58F18
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_02B58318
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_02B5AB78
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_02B53850
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_02B58FDF
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_02B5306F
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_0507334A NtQuerySystemInformation,
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_05073310 NtQuerySystemInformation,
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_05160FEA NtQuerySystemInformation,
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_05160FAF NtQuerySystemInformation,
      Source: 10377 APT800_B0205K0384.exeBinary or memory string: OriginalFilename vs 10377 APT800_B0205K0384.exe
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.718651459.00000000087B0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs 10377 APT800_B0205K0384.exe
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.709902982.00000000001B2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameUe1vZiW.exe4 vs 10377 APT800_B0205K0384.exe
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.710684503.0000000000918000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs 10377 APT800_B0205K0384.exe
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.718025479.0000000006D20000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs 10377 APT800_B0205K0384.exe
      Source: 10377 APT800_B0205K0384.exeBinary or memory string: OriginalFilename vs 10377 APT800_B0205K0384.exe
      Source: 10377 APT800_B0205K0384.exe, 00000005.00000000.706602369.00000000002F2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameUe1vZiW.exe4 vs 10377 APT800_B0205K0384.exe
      Source: 10377 APT800_B0205K0384.exeBinary or memory string: OriginalFilename vs 10377 APT800_B0205K0384.exe
      Source: 10377 APT800_B0205K0384.exe, 00000006.00000002.708267047.0000000000172000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameUe1vZiW.exe4 vs 10377 APT800_B0205K0384.exe
      Source: 10377 APT800_B0205K0384.exeBinary or memory string: OriginalFilename vs 10377 APT800_B0205K0384.exe
      Source: 10377 APT800_B0205K0384.exe, 00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 10377 APT800_B0205K0384.exe
      Source: 10377 APT800_B0205K0384.exe, 00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 10377 APT800_B0205K0384.exe
      Source: 10377 APT800_B0205K0384.exe, 00000007.00000002.929204128.0000000002ED1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 10377 APT800_B0205K0384.exe
      Source: 10377 APT800_B0205K0384.exe, 00000007.00000000.708875214.0000000000712000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameUe1vZiW.exe4 vs 10377 APT800_B0205K0384.exe
      Source: 10377 APT800_B0205K0384.exeBinary or memory string: OriginalFilenameUe1vZiW.exe4 vs 10377 APT800_B0205K0384.exe
      Source: 10377 APT800_B0205K0384.exeVirustotal: Detection: 23%
      Source: 10377 APT800_B0205K0384.exeReversingLabs: Detection: 26%
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeFile read: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeJump to behavior
      Source: 10377 APT800_B0205K0384.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe 'C:\Users\user\Desktop\10377 APT800_B0205K0384.exe'
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xErAccEJcQLD' /XML 'C:\Users\user\AppData\Local\Temp\tmp1570.tmp'
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess created: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe {path}
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess created: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe {path}
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess created: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe {path}
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xErAccEJcQLD' /XML 'C:\Users\user\AppData\Local\Temp\tmp1570.tmp'
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess created: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe {path}
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess created: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe {path}
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess created: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe {path}
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_0507301E AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_05072FE7 AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_05160DAA AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_05160D73 AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeFile created: C:\Users\user\AppData\Roaming\xErAccEJcQLD.exeJump to behavior
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeFile created: C:\Users\user\AppData\Local\Temp\tmp1570.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@10/4@19/2
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.709902982.00000000001B2000.00000002.00020000.sdmp, 10377 APT800_B0205K0384.exe, 00000005.00000000.706602369.00000000002F2000.00000002.00020000.sdmp, 10377 APT800_B0205K0384.exe, 00000006.00000002.708267047.0000000000172000.00000002.00020000.sdmp, 10377 APT800_B0205K0384.exe, 00000007.00000000.708875214.0000000000712000.00000002.00020000.sdmpBinary or memory string: INSERT INTO [cr_db] ([crno], [dept], [year], [sub], [topic], [facid], [qtot]) VALUES (@crno, @dept, @year, @sub, @topic, @facid, @qtot);
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.709902982.00000000001B2000.00000002.00020000.sdmp, 10377 APT800_B0205K0384.exe, 00000005.00000000.706602369.00000000002F2000.00000002.00020000.sdmp, 10377 APT800_B0205K0384.exe, 00000006.00000002.708267047.0000000000172000.00000002.00020000.sdmp, 10377 APT800_B0205K0384.exe, 00000007.00000000.708875214.0000000000712000.00000002.00020000.sdmpBinary or memory string: UPDATE [dbo].[studentreg] SET [prno] = @prno, [fname] = @fname, [mname] = @mname, [lname] = @lname, [rollno] = @rollno, [year] = @year, [div] = @div, [contact] = @contact, [password] = @password, [age] = @age, [gender] = @gender, [regdate] = @regdate WHERE (([prno] = @Original_prno) AND ((@IsNull_fname = 1 AND [fname] IS NULL) OR ([fname] = @Original_fname)) AND ((@IsNull_mname = 1 AND [mname] IS NULL) OR ([mname] = @Original_mname)) AND ((@IsNull_lname = 1 AND [lname] IS NULL) OR ([lname] = @Original_lname)) AND ((@IsNull_rollno = 1 AND [rollno] IS NULL) OR ([rollno] = @Original_rollno)) AND ((@IsNull_year = 1 AND [year] IS NULL) OR ([year] = @Original_year)) AND ((@IsNull_div = 1 AND [div] IS NULL) OR ([div] = @Original_div)) AND ((@IsNull_contact = 1 AND [contact] IS NULL) OR ([contact] = @Original_contact)) AND ((@IsNull_password = 1 AND [password] IS NULL) OR ([password] = @Original_password)) AND ((@IsNull_age = 1 AND [age] IS NULL) OR ([age] = @Original_age)) AND ((@IsNull_gender = 1 AND [gender] IS NULL) OR ([gender] = @Original_gender)) AND ((@IsNull_regdate = 1 AND [regdate] IS NULL) OR ([regdate] = @Original_regdate)));
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.709902982.00000000001B2000.00000002.00020000.sdmp, 10377 APT800_B0205K0384.exe, 00000005.00000000.706602369.00000000002F2000.00000002.00020000.sdmp, 10377 APT800_B0205K0384.exe, 00000006.00000002.708267047.0000000000172000.00000002.00020000.sdmp, 10377 APT800_B0205K0384.exe, 00000007.00000000.708875214.0000000000712000.00000002.00020000.sdmpBinary or memory string: INSERT INTO [dbo].[cr_db] ([crno], [dept], [year], [sub], [topic], [facid], [qtot]) VALUES (@crno, @dept, @year, @sub, @topic, @facid, @qtot);
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.709902982.00000000001B2000.00000002.00020000.sdmp, 10377 APT800_B0205K0384.exe, 00000005.00000000.706602369.00000000002F2000.00000002.00020000.sdmp, 10377 APT800_B0205K0384.exe, 00000006.00000002.708267047.0000000000172000.00000002.00020000.sdmp, 10377 APT800_B0205K0384.exe, 00000007.00000000.708875214.0000000000712000.00000002.00020000.sdmpBinary or memory string: INSERT INTO [dbo].[studentreg] ([prno], [fname], [mname], [lname], [rollno], [year], [div], [contact], [password], [age], [gender], [regdate]) VALUES (@prno, @fname, @mname, @lname, @rollno, @year, @div, @contact, @password, @age, @gender, @regdate);
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1904:120:WilError_01
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeMutant created: \Sessions\1\BaseNamedObjects\ELAIITwngSefilReBsBJLauTa
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{9358a53f-433c-42f5-bd3f-14ae4da528cf}
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net data provider for sqlserver
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: 10377 APT800_B0205K0384.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: 10377 APT800_B0205K0384.exeStatic file information: File size 1583616 > 1048576
      Source: 10377 APT800_B0205K0384.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: 10377 APT800_B0205K0384.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x182000
      Source: 10377 APT800_B0205K0384.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: 10377 APT800_B0205K0384.exe, Login.cs.Net Code: Str_012 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_0255C202 push ds; retf
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_02551AE1 pushfd ; retf 0000h
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_02551AA9 pushfd ; retf 0000h
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_0255013C push ebx; iretd
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_0255C9CD push ebx; ret
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_025519F9 pushfd ; retf 0000h
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_0255C18A pushfd ; retf
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 0_2_06D57B7B push ecx; ret
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_02B59EF0 push 0000006Fh; ret
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_02B59F18 push 0000006Fh; ret
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeFile created: C:\Users\user\AppData\Roaming\xErAccEJcQLD.exeJump to dropped file

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xErAccEJcQLD' /XML 'C:\Users\user\AppData\Local\Temp\tmp1570.tmp'
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Yara detected AntiVM3Show sources
      Source: Yara matchFile source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 5960, type: MEMORYSTR
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.711477717.00000000029D1000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.711477717.00000000029D1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe TID: 5640Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe TID: 5640Thread sleep time: -240000s >= -30000s
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe TID: 5640Thread sleep time: -1200000s >= -30000s
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe TID: 5640Thread sleep time: -30000s >= -30000s
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe TID: 3512Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe TID: 5292Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe TID: 5292Thread sleep count: 373 > 30
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe TID: 5292Thread sleep count: 834 > 30
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe TID: 3096Thread sleep count: 304 > 30
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe TID: 5292Thread sleep count: 286 > 30
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeThread delayed: delay time: 240000
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeWindow / User API: threadDelayed 373
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeWindow / User API: threadDelayed 834
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeWindow / User API: foregroundWindowGot 696
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_05162206 GetSystemInfo,
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeThread delayed: delay time: 240000
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeThread delayed: delay time: 30000
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeThread delayed: delay time: 30000
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeThread delayed: delay time: 922337203685477
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.711477717.00000000029D1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.711477717.00000000029D1000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.711477717.00000000029D1000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.711477717.00000000029D1000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.711477717.00000000029D1000.00000004.00000001.sdmpBinary or memory string: VMWARE
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.711477717.00000000029D1000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.710684503.0000000000918000.00000004.00000020.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.711477717.00000000029D1000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.711477717.00000000029D1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.711477717.00000000029D1000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeMemory written: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xErAccEJcQLD' /XML 'C:\Users\user\AppData\Local\Temp\tmp1570.tmp'
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess created: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe {path}
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess created: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe {path}
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeProcess created: C:\Users\user\Desktop\10377 APT800_B0205K0384.exe {path}
      Source: 10377 APT800_B0205K0384.exe, 00000007.00000002.929598143.0000000003149000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: 10377 APT800_B0205K0384.exe, 00000007.00000002.929015138.0000000001610000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: 10377 APT800_B0205K0384.exe, 00000007.00000002.929015138.0000000001610000.00000002.00020000.sdmpBinary or memory string: Progman
      Source: 10377 APT800_B0205K0384.exe, 00000007.00000002.929015138.0000000001610000.00000002.00020000.sdmpBinary or memory string: Progmanlock
      Source: 10377 APT800_B0205K0384.exe, 00000007.00000002.929522587.0000000003104000.00000004.00000001.sdmpBinary or memory string: Program ManagertL
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.5620000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.5620000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.5624629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f1e3d4.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f1e3d4.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f229fd.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.10377 APT800_B0205K0384.exe.3c8d590.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f1959e.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.713144984.00000000039D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.927919186.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.929668288.0000000003F17000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 5960, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 3484, type: MEMORYSTR

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: 10377 APT800_B0205K0384.exe, 00000000.00000002.713144984.00000000039D1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 10377 APT800_B0205K0384.exe, 00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 10377 APT800_B0205K0384.exe, 00000007.00000002.929204128.0000000002ED1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.5620000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.5620000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.5624629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f1e3d4.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f1e3d4.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f229fd.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.10377 APT800_B0205K0384.exe.3c8d590.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.10377 APT800_B0205K0384.exe.3f1959e.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.10377 APT800_B0205K0384.exe.3b67540.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.713144984.00000000039D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.927919186.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.929668288.0000000003F17000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 5960, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 10377 APT800_B0205K0384.exe PID: 3484, type: MEMORYSTR
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_05162362 bind,
      Source: C:\Users\user\Desktop\10377 APT800_B0205K0384.exeCode function: 7_2_05162310 bind,

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsScheduled Task/Job1Scheduled Task/Job1Access Token Manipulation1Masquerading1Input Capture21Security Software Discovery21Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection112LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsSystem Information Discovery13VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing11DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      10377 APT800_B0205K0384.exe23%VirustotalBrowse
      10377 APT800_B0205K0384.exe27%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
      10377 APT800_B0205K0384.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\xErAccEJcQLD.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\xErAccEJcQLD.exe27%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      7.2.10377 APT800_B0205K0384.exe.5620000.7.unpack100%AviraTR/NanoCore.fadteDownload File
      7.2.10377 APT800_B0205K0384.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

      Domains

      SourceDetectionScannerLabelLink
      mec.sytes.net7%VirustotalBrowse

      URLs

      SourceDetectionScannerLabelLink
      http://tempuri.org/educrossDataSet.xsd0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://tempuri.org/educrossDataSet6.xsd0%Avira URL Cloudsafe
      mec.sytes.net7%VirustotalBrowse
      mec.sytes.net0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/(=0%Avira URL Cloudsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.founder.com.cn/cnopoJ0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn/v:0%Avira URL Cloudsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.founder.com.cn/cns-cN0%Avira URL Cloudsafe
      http://tempuri.org/educrossDataSet5.xsd0%Avira URL Cloudsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/40%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/pt-b0%Avira URL Cloudsafe
      http://tempuri.org/educrossDataSet8.xsd0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/Y0l0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/H?0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/Y0s40%Avira URL Cloudsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.fontbureau.comase0%Avira URL Cloudsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://tempuri.org/educrossDataSet7.xsd0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/Y0%URL Reputationsafe
      http://tempuri.org/educrossDataSet1.xsd0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/K0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/xI0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
      http://tempuri.org/educrossDataSet9.xsd0%Avira URL Cloudsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://tempuri.org/educrossDataSet4.xsd0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/n0%URL Reputationsafe
      http://www.fontbureau.como0%URL Reputationsafe
      http://tempuri.org/educrossDataSet2.xsd0%Avira URL Cloudsafe
      http://www.fontbureau.commeta40%Avira URL Cloudsafe
      http://tempuri.org/educrossDataSet3.xsd0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      mec.sytes.net
      194.5.97.210
      truetrueunknown

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      mec.sytes.nettrue
      • 7%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://www.fontbureau.com/designersG10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
        high
        http://tempuri.org/educrossDataSet.xsd10377 APT800_B0205K0384.exefalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designers/?10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
          high
          http://www.founder.com.cn/cn/bThe10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designers?10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
            high
            http://tempuri.org/educrossDataSet6.xsd10377 APT800_B0205K0384.exefalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/(=10377 APT800_B0205K0384.exe, 00000000.00000003.666946127.00000000051C3000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.tiro.com10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
              high
              http://www.founder.com.cn/cnopoJ10377 APT800_B0205K0384.exe, 00000000.00000003.664841177.00000000051A5000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.founder.com.cn/cn/v:10377 APT800_B0205K0384.exe, 00000000.00000003.665144024.00000000051AE000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.goodfont.co.kr10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cns-cN10377 APT800_B0205K0384.exe, 00000000.00000003.664956704.00000000051A6000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://tempuri.org/educrossDataSet5.xsd10377 APT800_B0205K0384.exefalse
              • Avira URL Cloud: safe
              unknown
              http://www.sajatypeworks.com10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.typography.netD10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cn/cThe10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.galapagosdesign.com/staff/dennis.htm10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmp, 10377 APT800_B0205K0384.exe, 00000000.00000002.717203972.00000000051A0000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://fontfabrik.com10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/410377 APT800_B0205K0384.exe, 00000000.00000003.666491209.00000000051C3000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/pt-b10377 APT800_B0205K0384.exe, 00000000.00000003.666166391.00000000051BB000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://tempuri.org/educrossDataSet8.xsd10377 APT800_B0205K0384.exefalse
              • Avira URL Cloud: safe
              unknown
              http://www.jiyu-kobo.co.jp/Y0l10377 APT800_B0205K0384.exe, 00000000.00000003.666651887.00000000051C3000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.galapagosdesign.com/DPlease10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/H?10377 APT800_B0205K0384.exe, 00000000.00000003.666166391.00000000051BB000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fonts.com10377 APT800_B0205K0384.exe, 00000000.00000003.663769191.00000000051BB000.00000004.00000001.sdmpfalse
                high
                http://www.jiyu-kobo.co.jp/Y0s410377 APT800_B0205K0384.exe, 00000000.00000003.666421425.00000000051C3000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.sandoll.co.kr10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.urwpp.deDPlease10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.zhongyicts.com.cn10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.comase10377 APT800_B0205K0384.exe, 00000000.00000003.709575017.00000000051BE000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.sakkal.com10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://tempuri.org/educrossDataSet7.xsd10377 APT800_B0205K0384.exefalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp/Y10377 APT800_B0205K0384.exe, 00000000.00000003.666651887.00000000051C3000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://tempuri.org/educrossDataSet1.xsd10377 APT800_B0205K0384.exefalse
                • Avira URL Cloud: safe
                unknown
                http://www.apache.org/licenses/LICENSE-2.010377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
                  high
                  http://www.fontbureau.com10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
                    high
                    http://www.jiyu-kobo.co.jp/K10377 APT800_B0205K0384.exe, 00000000.00000003.666166391.00000000051BB000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/xI10377 APT800_B0205K0384.exe, 00000000.00000003.666491209.00000000051C3000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/jp/10377 APT800_B0205K0384.exe, 00000000.00000003.666946127.00000000051C3000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/educrossDataSet9.xsd10377 APT800_B0205K0384.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.carterandcone.coml10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlN10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
                      high
                      http://www.founder.com.cn/cn10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/frere-user.html10377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
                        high
                        http://tempuri.org/educrossDataSet4.xsd10377 APT800_B0205K0384.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/10377 APT800_B0205K0384.exe, 00000000.00000003.666946127.00000000051C3000.00000004.00000001.sdmp, 10377 APT800_B0205K0384.exe, 00000000.00000003.666651887.00000000051C3000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/n10377 APT800_B0205K0384.exe, 00000000.00000003.666651887.00000000051C3000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.como10377 APT800_B0205K0384.exe, 00000000.00000003.709575017.00000000051BE000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers810377 APT800_B0205K0384.exe, 00000000.00000002.717417194.00000000063B2000.00000004.00000001.sdmpfalse
                          high
                          http://tempuri.org/educrossDataSet2.xsd10377 APT800_B0205K0384.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-user.htmlt10377 APT800_B0205K0384.exe, 00000000.00000003.668696632.00000000051BE000.00000004.00000001.sdmpfalse
                            high
                            http://www.fontbureau.commeta410377 APT800_B0205K0384.exe, 00000000.00000003.709575017.00000000051BE000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designers/10377 APT800_B0205K0384.exe, 00000000.00000003.668065555.00000000051E6000.00000004.00000001.sdmpfalse
                              high
                              http://tempuri.org/educrossDataSet3.xsd10377 APT800_B0205K0384.exefalse
                              • Avira URL Cloud: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              194.5.97.210
                              mec.sytes.netNetherlands
                              208476DANILENKODEtrue

                              Private

                              IP
                              192.168.2.1

                              General Information

                              Joe Sandbox Version:33.0.0 White Diamond
                              Analysis ID:492186
                              Start date:28.09.2021
                              Start time:13:01:11
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 11m 38s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:10377 APT800_B0205K0384.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:18
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@10/4@19/2
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 1.3% (good quality ratio 1.3%)
                              • Quality average: 63.8%
                              • Quality standard deviation: 22.9%
                              HCA Information:
                              • Successful, ratio: 90%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                              • TCP Packets have been reduced to 100
                              • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                              • Excluded IPs from analysis (whitelisted): 23.211.6.115, 20.50.102.62, 209.197.3.8, 20.54.110.249, 40.112.88.60, 20.49.157.6, 80.67.82.211, 80.67.82.235, 20.82.209.183
                              • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, store-images.s-microsoft.com-c.edgekey.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              13:02:11API Interceptor140x Sleep call for process: 10377 APT800_B0205K0384.exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              194.5.97.210PO-10377.exeGet hashmaliciousBrowse
                                Purchase Order_PO226520_1632165053105.exeGet hashmaliciousBrowse

                                  Domains

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  mec.sytes.netExpo Grup - 1122002092021 Sept.exeGet hashmaliciousBrowse
                                  • 194.5.97.253
                                  Esasl#U0131grup-082921.exeGet hashmaliciousBrowse
                                  • 194.5.97.253
                                  Order No.1536-R - PS0305052.exeGet hashmaliciousBrowse
                                  • 194.5.97.253
                                  Order No.1536-R - PS0305052.exeGet hashmaliciousBrowse
                                  • 194.5.97.253
                                  AUTOTEK-DRAFT.exeGet hashmaliciousBrowse
                                  • 194.5.97.253
                                  QE20-MCA TS-IPBCP-07022021.xlsx.exeGet hashmaliciousBrowse
                                  • 194.5.97.253
                                  1000005536 - UCML.exeGet hashmaliciousBrowse
                                  • 194.5.97.253

                                  ASN

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  DANILENKODE4r9YQMT4ty.exeGet hashmaliciousBrowse
                                  • 194.5.97.123
                                  PO-10377.exeGet hashmaliciousBrowse
                                  • 194.5.97.210
                                  Purchase order_8727632626.exeGet hashmaliciousBrowse
                                  • 194.5.97.165
                                  HrcD1NM6Cc.exeGet hashmaliciousBrowse
                                  • 194.5.98.107
                                  Ye24KLFmv7.exeGet hashmaliciousBrowse
                                  • 194.5.97.159
                                  Dkvunfebdprvvugtyhevcozxmecjaaclna.exeGet hashmaliciousBrowse
                                  • 194.5.98.145
                                  Dkvunfebdprvvugtyhevcozxmecjaaclna.exeGet hashmaliciousBrowse
                                  • 194.5.98.145
                                  SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.32050.exeGet hashmaliciousBrowse
                                  • 194.5.97.159
                                  INrZg0O5sW.exeGet hashmaliciousBrowse
                                  • 194.5.98.28
                                  ssJJ6FZpme.exeGet hashmaliciousBrowse
                                  • 194.5.98.174
                                  Pedido 20839.docGet hashmaliciousBrowse
                                  • 194.5.97.131
                                  7oqy9l4vR3.exeGet hashmaliciousBrowse
                                  • 194.5.97.131
                                  l03Xk5fY71.exeGet hashmaliciousBrowse
                                  • 194.5.97.75
                                  Purchase Order_PO226520_1632165053105.exeGet hashmaliciousBrowse
                                  • 194.5.97.210
                                  Uagotroyziwvcibwpnikzpntgibtenaeqp.exeGet hashmaliciousBrowse
                                  • 194.5.98.145
                                  geqkE83hBJ.exeGet hashmaliciousBrowse
                                  • 194.5.98.158
                                  3Kkihz29yQ.exeGet hashmaliciousBrowse
                                  • 194.5.98.239
                                  1f7hoIaSEp.exeGet hashmaliciousBrowse
                                  • 194.5.97.212
                                  oG3LcnkqSU.exeGet hashmaliciousBrowse
                                  • 194.5.98.103
                                  New policy.xlsxGet hashmaliciousBrowse
                                  • 194.5.98.103

                                  JA3 Fingerprints

                                  No context

                                  Dropped Files

                                  No context

                                  Created / dropped Files

                                  C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\10377 APT800_B0205K0384.exe.log
                                  Process:C:\Users\user\Desktop\10377 APT800_B0205K0384.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):895
                                  Entropy (8bit):5.267807484859312
                                  Encrypted:false
                                  SSDEEP:24:MLF20NaL329hJ5g522rWz2p2a26K95rKoO2+g2+:MwLLG9h3go2rG2Y96ox+g2+
                                  MD5:71045A6CDFEDBA57AE9764976E527C16
                                  SHA1:9B73DC9307DE07F1A1FBEE4B35A773F0CAAC368A
                                  SHA-256:49965CE9A6C209AFDEF8EF965B5B0C74B433CE8AFFF7A6429FDDDE5387770436
                                  SHA-512:00F503A09856841CEB5754D5C81BCCDEE8B5484192F68AB1EF711B232D61127A3B37BEF376E3DEFA72A12EF6C8E621586B08542E200545529008F8E228C727D9
                                  Malicious:true
                                  Reputation:low
                                  Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Data\27ab8d047396db374abb803b446b76f0\System.Data.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\de460308a9099237864d2ec2328fc958\System.Configuration.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\527c933194f3a99a816d83c619a3e1d3\System.Xml.ni.dll",0..
                                  C:\Users\user\AppData\Local\Temp\tmp1570.tmp
                                  Process:C:\Users\user\Desktop\10377 APT800_B0205K0384.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1645
                                  Entropy (8bit):5.184997659754982
                                  Encrypted:false
                                  SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBG1tn:cbhK79lNQR/rydbz9I3YODOLNdq3Q
                                  MD5:AC54D2588D97DEDE121E8741E307B6C5
                                  SHA1:936F5026F13F7DDB22DA3AABB64E69C0D8DD9800
                                  SHA-256:E02FB313D235B61FADCA76EB23287FD1307730440D002CF96AB15B7E5506E964
                                  SHA-512:127505172D01BC03FF05802ACFF1524A62E39E5DED441B6173286ABD92EE0F8DAFFD384A385742065C9C648FF52D821924055F5ED605759D8D6BE8F9320AEDF8
                                  Malicious:true
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                  Process:C:\Users\user\Desktop\10377 APT800_B0205K0384.exe
                                  File Type:Non-ISO extended-ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):8
                                  Entropy (8bit):3.0
                                  Encrypted:false
                                  SSDEEP:3:1Qt:qt
                                  MD5:F1DA48E34DBA018E306A1AD81188C78A
                                  SHA1:CBA51D40D50B7FC0F3837A6D3F079679C2A90E57
                                  SHA-256:752AB2C900949B69BA198E1F07F24E8661874912B4B583B222E89477FC0EE610
                                  SHA-512:5D91FA3EB64CA01503B0A265723A4AB3E11BC510502AD45A26881692FC17691CF1D8D8680D428015659F44489667DBA95FFA54597E8B70CFB46DA8CAA18486EF
                                  Malicious:true
                                  Reputation:low
                                  Preview: N..vo..H
                                  C:\Users\user\AppData\Roaming\xErAccEJcQLD.exe
                                  Process:C:\Users\user\Desktop\10377 APT800_B0205K0384.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):1583616
                                  Entropy (8bit):6.283534376041644
                                  Encrypted:false
                                  SSDEEP:12288:jfuyMJL4xqDGHF3rzbMfOhVr0I1hwd3o+VJNMzh4FmKinjIRsjr:HMy2YqfOL4ahwdYEnMzhE
                                  MD5:4F0F86315B42B8DAD8A1B430D5AC084A
                                  SHA1:E50192512D5CF87ECE05A1B3974FCCC652EFF93B
                                  SHA-256:8222127C77B4F83832246E9CE96DA7741F1352DA9D3548AD8B959B2E00B54C0D
                                  SHA-512:4F482B78BFF1D42D5EC66088C3219628563AF190A503C8508941F834F144CF6ABA0517200C45E362D0EB83949C1EA23D77D39E1C1057E07EFB6AFEC9A58076D4
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 27%
                                  Reputation:low
                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ra..............P.. ...........?... ...@....@.. ....................................@.................................<?..O....@.......................`....................................................... ............... ..H............text........ ... .................. ..`.rsrc........@......."..............@..@.reloc.......`.......(..............@..B................p?......H........W..t.......H...|Z................................................(+...*..(,...*.s-........s.........s/........s0........s1........*.~....o2...*.~....o3...*.~....o4...*.~....o5...*.~....o6...*.~.....(7...,.r...p.....(8...o9...s:........~....*.~....*.......*~(....r%..p~....o;...(<...t#...*Vs....(=...t.........*..(>...*.~....*F.r5..po?...(@...*F.rW..po?...(@...*F.r...po?...(@...*.(....*..(A...*.r%..p*.r...p*....0..|........(B...........sC...(D....sE...}.....sE...}.....s

                                  Static File Info

                                  General

                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):6.283534376041644
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:10377 APT800_B0205K0384.exe
                                  File size:1583616
                                  MD5:4f0f86315b42b8dad8a1b430d5ac084a
                                  SHA1:e50192512d5cf87ece05a1b3974fccc652eff93b
                                  SHA256:8222127c77b4f83832246e9ce96da7741f1352da9d3548ad8b959b2e00b54c0d
                                  SHA512:4f482b78bff1d42d5ec66088c3219628563af190a503c8508941f834f144cf6aba0517200c45e362d0eb83949c1ea23d77d39e1c1057e07efb6afec9a58076d4
                                  SSDEEP:12288:jfuyMJL4xqDGHF3rzbMfOhVr0I1hwd3o+VJNMzh4FmKinjIRsjr:HMy2YqfOL4ahwdYEnMzhE
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ra..............P.. ...........?... ...@....@.. ....................................@................................

                                  File Icon

                                  Icon Hash:00828e8e8686b000

                                  Static PE Info

                                  General

                                  Entrypoint:0x583f8e
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                  Time Stamp:0x6152CC10 [Tue Sep 28 08:02:24 2021 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:v2.0.50727
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                  Entrypoint Preview

                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add al, byte ptr [eax]
                                  adc byte ptr [eax], al
                                  add byte ptr [eax], al
                                  and byte ptr [eax], al
                                  add byte ptr [eax+00000018h], al
                                  push eax
                                  add byte ptr [eax], al
                                  add byte ptr [eax], 00000000h
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add dword ptr [eax], eax
                                  add dword ptr [eax], eax
                                  add byte ptr [eax], al
                                  cmp byte ptr [eax], al
                                  add byte ptr [eax+00000000h], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add dword ptr [eax], eax
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], 00000000h
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al

                                  Data Directories

                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x183f3c0x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1840000x5d8.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1860000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                  Sections

                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x181f940x182000False0.426426388439data6.28644418868IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                  .rsrc0x1840000x5d80x600False0.442057291667data4.21879608378IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x1860000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                  Resources

                                  NameRVASizeTypeLanguageCountry
                                  RT_VERSION0x1840900x348data
                                  RT_MANIFEST0x1843e80x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                  Imports

                                  DLLImport
                                  mscoree.dll_CorExeMain

                                  Version Infos

                                  DescriptionData
                                  Translation0x0000 0x04b0
                                  LegalCopyrightCopyright Nickerson Farms
                                  Assembly Version1.2.7.0
                                  InternalNameUe1vZiW.exe
                                  FileVersion1.6.4.6
                                  CompanyNameNickerson Farms
                                  LegalTrademarks
                                  Comments
                                  ProductNameHuyler's2
                                  ProductVersion1.6.4.6
                                  FileDescriptionHuyler's
                                  OriginalFilenameUe1vZiW.exe

                                  Network Behavior

                                  Snort IDS Alerts

                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  09/28/21-13:02:31.503135UDP254DNS SPOOF query response with TTL of 1 min. and no authority53499108.8.8.8192.168.2.4
                                  09/28/21-13:02:37.072741UDP254DNS SPOOF query response with TTL of 1 min. and no authority53645498.8.8.8192.168.2.4
                                  09/28/21-13:02:43.288075UDP254DNS SPOOF query response with TTL of 1 min. and no authority53631538.8.8.8192.168.2.4
                                  09/28/21-13:03:05.891525UDP254DNS SPOOF query response with TTL of 1 min. and no authority53496128.8.8.8192.168.2.4
                                  09/28/21-13:03:11.390765UDP254DNS SPOOF query response with TTL of 1 min. and no authority53608758.8.8.8192.168.2.4
                                  09/28/21-13:03:16.891420UDP254DNS SPOOF query response with TTL of 1 min. and no authority53591728.8.8.8192.168.2.4
                                  09/28/21-13:03:28.161927UDP254DNS SPOOF query response with TTL of 1 min. and no authority53605798.8.8.8192.168.2.4
                                  09/28/21-13:04:02.674608UDP254DNS SPOOF query response with TTL of 1 min. and no authority53606898.8.8.8192.168.2.4
                                  09/28/21-13:04:08.504760UDP254DNS SPOOF query response with TTL of 1 min. and no authority53642068.8.8.8192.168.2.4
                                  09/28/21-13:04:14.011569UDP254DNS SPOOF query response with TTL of 1 min. and no authority53509048.8.8.8192.168.2.4

                                  Network Port Distribution

                                  TCP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Sep 28, 2021 13:02:31.511193991 CEST497693259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:02:31.661264896 CEST325949769194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:02:32.172400951 CEST497693259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:02:32.318702936 CEST325949769194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:02:32.828744888 CEST497693259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:02:32.975584984 CEST325949769194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:02:37.075158119 CEST497723259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:02:37.221431017 CEST325949772194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:02:37.735419035 CEST497723259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:02:37.882256031 CEST325949772194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:02:38.391778946 CEST497723259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:02:38.539320946 CEST325949772194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:02:43.291629076 CEST497733259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:02:43.437921047 CEST325949773194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:02:43.939044952 CEST497733259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:02:44.086360931 CEST325949773194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:02:44.611592054 CEST497733259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:02:44.757680893 CEST325949773194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:02:49.014705896 CEST497743259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:02:49.161367893 CEST325949774194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:02:49.673928976 CEST497743259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:02:49.820595980 CEST325949774194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:02:50.330255985 CEST497743259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:02:50.477361917 CEST325949774194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:02:54.510417938 CEST497773259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:02:54.656548023 CEST325949777194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:02:55.189971924 CEST497773259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:02:55.336216927 CEST325949777194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:02:55.893237114 CEST497773259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:02:56.039712906 CEST325949777194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:00.073802948 CEST497953259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:00.220122099 CEST325949795194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:00.721754074 CEST497953259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:00.867939949 CEST325949795194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:01.377974987 CEST497953259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:01.524269104 CEST325949795194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:05.893763065 CEST497963259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:06.040152073 CEST325949796194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:06.550328970 CEST497963259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:06.696851969 CEST325949796194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:07.206633091 CEST497963259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:07.352943897 CEST325949796194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:11.393820047 CEST498103259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:11.544498920 CEST325949810194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:12.050776958 CEST498103259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:12.198956966 CEST325949810194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:12.707076073 CEST498103259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:12.853384018 CEST325949810194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:16.893394947 CEST498373259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:17.039856911 CEST325949837194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:17.552196026 CEST498373259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:17.698909998 CEST325949837194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:18.207564116 CEST498373259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:18.354283094 CEST325949837194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:22.663332939 CEST498383259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:22.810527086 CEST325949838194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:23.317384958 CEST498383259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:23.464010954 CEST325949838194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:23.973861933 CEST498383259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:24.121546984 CEST325949838194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:28.163337946 CEST498393259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:28.309561014 CEST325949839194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:28.817850113 CEST498393259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:28.964121103 CEST325949839194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:29.489813089 CEST498393259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:29.636271954 CEST325949839194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:34.174479008 CEST498403259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:34.322319984 CEST325949840194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:34.834106922 CEST498403259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:34.980833054 CEST325949840194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:35.490263939 CEST498403259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:35.637151003 CEST325949840194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:40.198221922 CEST498413259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:40.345979929 CEST325949841194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:40.850188017 CEST498413259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:40.996928930 CEST325949841194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:41.506386995 CEST498413259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:41.652970076 CEST325949841194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:45.708616972 CEST498423259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:45.854907990 CEST325949842194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:46.366277933 CEST498423259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:46.512830019 CEST325949842194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:47.022564888 CEST498423259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:47.168791056 CEST325949842194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:51.369951010 CEST498603259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:51.523226023 CEST325949860194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:52.038602114 CEST498603259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:52.186862946 CEST325949860194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:52.694844961 CEST498603259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:52.844702005 CEST325949860194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:57.175940037 CEST498863259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:57.322278976 CEST325949886194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:57.835921049 CEST498863259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:57.983200073 CEST325949886194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:03:58.492296934 CEST498863259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:03:58.639352083 CEST325949886194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:04:02.676104069 CEST498973259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:04:02.822515011 CEST325949897194.5.97.210192.168.2.4
                                  Sep 28, 2021 13:04:03.336380005 CEST498973259192.168.2.4194.5.97.210
                                  Sep 28, 2021 13:04:03.483536959 CEST325949897194.5.97.210192.168.2.4

                                  UDP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Sep 28, 2021 13:02:01.126291990 CEST6238953192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:01.147357941 CEST53623898.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:31.481961012 CEST4991053192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:31.503134966 CEST53499108.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:33.079540968 CEST5585453192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:33.113491058 CEST53558548.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:37.051628113 CEST6454953192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:37.072741032 CEST53645498.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:43.260574102 CEST6315353192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:43.288074970 CEST53631538.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:48.993408918 CEST5299153192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:49.012825012 CEST53529918.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:52.858903885 CEST5370053192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:52.875663996 CEST53537008.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:53.816545010 CEST5172653192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:53.889944077 CEST53517268.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:54.489917994 CEST5679453192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:54.509090900 CEST53567948.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:54.571377993 CEST5653453192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:54.590727091 CEST53565348.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:55.194338083 CEST5662753192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:55.216381073 CEST53566278.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:55.580415964 CEST5662153192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:55.593395948 CEST6311653192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:55.607604980 CEST53566218.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:55.617508888 CEST53631168.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:56.062444925 CEST6407853192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:56.082154036 CEST53640788.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:56.498897076 CEST6480153192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:56.537822008 CEST53648018.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:57.129729986 CEST6172153192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:57.148813009 CEST53617218.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:57.892467022 CEST5125553192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:57.912472010 CEST53512558.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:59.135674953 CEST6152253192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:59.155859947 CEST53615228.8.8.8192.168.2.4
                                  Sep 28, 2021 13:02:59.660387993 CEST5233753192.168.2.48.8.8.8
                                  Sep 28, 2021 13:02:59.693703890 CEST53523378.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:00.055152893 CEST5504653192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:00.072403908 CEST53550468.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:05.870115995 CEST4961253192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:05.891525030 CEST53496128.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:08.671057940 CEST4928553192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:08.677229881 CEST5060153192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:08.697261095 CEST53492858.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:08.712111950 CEST53506018.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:11.369755030 CEST6087553192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:11.390764952 CEST53608758.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:11.499787092 CEST5644853192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:11.521528006 CEST53564488.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:16.869535923 CEST5917253192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:16.891419888 CEST53591728.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:22.641391993 CEST6242053192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:22.661612988 CEST53624208.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:28.141479015 CEST6057953192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:28.161926985 CEST53605798.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:34.020157099 CEST5018353192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:34.074166059 CEST53501838.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:40.177138090 CEST6153153192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:40.196518898 CEST53615318.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:45.668786049 CEST4922853192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:45.688414097 CEST53492288.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:46.532721043 CEST5979453192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:46.568348885 CEST53597948.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:47.698585033 CEST5591653192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:47.718503952 CEST53559168.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:51.348511934 CEST5275253192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:51.368330956 CEST53527528.8.8.8192.168.2.4
                                  Sep 28, 2021 13:03:57.154804945 CEST6054253192.168.2.48.8.8.8
                                  Sep 28, 2021 13:03:57.174140930 CEST53605428.8.8.8192.168.2.4
                                  Sep 28, 2021 13:04:02.652659893 CEST6068953192.168.2.48.8.8.8
                                  Sep 28, 2021 13:04:02.674607992 CEST53606898.8.8.8192.168.2.4
                                  Sep 28, 2021 13:04:08.483390093 CEST6420653192.168.2.48.8.8.8
                                  Sep 28, 2021 13:04:08.504760027 CEST53642068.8.8.8192.168.2.4
                                  Sep 28, 2021 13:04:13.979492903 CEST5090453192.168.2.48.8.8.8
                                  Sep 28, 2021 13:04:14.011569023 CEST53509048.8.8.8192.168.2.4

                                  DNS Queries

                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  Sep 28, 2021 13:02:31.481961012 CEST192.168.2.48.8.8.80x6b29Standard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:02:37.051628113 CEST192.168.2.48.8.8.80xffecStandard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:02:43.260574102 CEST192.168.2.48.8.8.80x3b74Standard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:02:48.993408918 CEST192.168.2.48.8.8.80xcd5cStandard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:02:54.489917994 CEST192.168.2.48.8.8.80xaea8Standard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:00.055152893 CEST192.168.2.48.8.8.80x6530Standard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:05.870115995 CEST192.168.2.48.8.8.80x54fdStandard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:11.369755030 CEST192.168.2.48.8.8.80xc987Standard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:16.869535923 CEST192.168.2.48.8.8.80x392eStandard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:22.641391993 CEST192.168.2.48.8.8.80xeccdStandard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:28.141479015 CEST192.168.2.48.8.8.80x8e14Standard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:34.020157099 CEST192.168.2.48.8.8.80x5916Standard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:40.177138090 CEST192.168.2.48.8.8.80x1faaStandard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:45.668786049 CEST192.168.2.48.8.8.80xb24bStandard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:51.348511934 CEST192.168.2.48.8.8.80x2fb4Standard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:57.154804945 CEST192.168.2.48.8.8.80x6f85Standard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:04:02.652659893 CEST192.168.2.48.8.8.80x9cc6Standard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:04:08.483390093 CEST192.168.2.48.8.8.80xeb4eStandard query (0)mec.sytes.netA (IP address)IN (0x0001)
                                  Sep 28, 2021 13:04:13.979492903 CEST192.168.2.48.8.8.80xd04bStandard query (0)mec.sytes.netA (IP address)IN (0x0001)

                                  DNS Answers

                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  Sep 28, 2021 13:02:31.503134966 CEST8.8.8.8192.168.2.40x6b29No error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:02:37.072741032 CEST8.8.8.8192.168.2.40xffecNo error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:02:43.288074970 CEST8.8.8.8192.168.2.40x3b74No error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:02:49.012825012 CEST8.8.8.8192.168.2.40xcd5cNo error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:02:54.509090900 CEST8.8.8.8192.168.2.40xaea8No error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:00.072403908 CEST8.8.8.8192.168.2.40x6530No error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:05.891525030 CEST8.8.8.8192.168.2.40x54fdNo error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:11.390764952 CEST8.8.8.8192.168.2.40xc987No error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:16.891419888 CEST8.8.8.8192.168.2.40x392eNo error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:22.661612988 CEST8.8.8.8192.168.2.40xeccdNo error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:28.161926985 CEST8.8.8.8192.168.2.40x8e14No error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:34.074166059 CEST8.8.8.8192.168.2.40x5916No error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:40.196518898 CEST8.8.8.8192.168.2.40x1faaNo error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:45.688414097 CEST8.8.8.8192.168.2.40xb24bNo error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:51.368330956 CEST8.8.8.8192.168.2.40x2fb4No error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:03:57.174140930 CEST8.8.8.8192.168.2.40x6f85No error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:04:02.674607992 CEST8.8.8.8192.168.2.40x9cc6No error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:04:08.504760027 CEST8.8.8.8192.168.2.40xeb4eNo error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)
                                  Sep 28, 2021 13:04:14.011569023 CEST8.8.8.8192.168.2.40xd04bNo error (0)mec.sytes.net194.5.97.210A (IP address)IN (0x0001)

                                  Code Manipulations

                                  Statistics

                                  Behavior

                                  Click to jump to process

                                  System Behavior

                                  General

                                  Start time:13:02:06
                                  Start date:28/09/2021
                                  Path:C:\Users\user\Desktop\10377 APT800_B0205K0384.exe
                                  Wow64 process (32bit):true
                                  Commandline:'C:\Users\user\Desktop\10377 APT800_B0205K0384.exe'
                                  Imagebase:0x1b0000
                                  File size:1583616 bytes
                                  MD5 hash:4F0F86315B42B8DAD8A1B430D5AC084A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.713144984.00000000039D1000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.713144984.00000000039D1000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.713144984.00000000039D1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  Reputation:low

                                  General

                                  Start time:13:02:26
                                  Start date:28/09/2021
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xErAccEJcQLD' /XML 'C:\Users\user\AppData\Local\Temp\tmp1570.tmp'
                                  Imagebase:0x1080000
                                  File size:185856 bytes
                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:13:02:26
                                  Start date:28/09/2021
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff724c50000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:13:02:27
                                  Start date:28/09/2021
                                  Path:C:\Users\user\Desktop\10377 APT800_B0205K0384.exe
                                  Wow64 process (32bit):false
                                  Commandline:{path}
                                  Imagebase:0x2f0000
                                  File size:1583616 bytes
                                  MD5 hash:4F0F86315B42B8DAD8A1B430D5AC084A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low

                                  General

                                  Start time:13:02:27
                                  Start date:28/09/2021
                                  Path:C:\Users\user\Desktop\10377 APT800_B0205K0384.exe
                                  Wow64 process (32bit):false
                                  Commandline:{path}
                                  Imagebase:0x170000
                                  File size:1583616 bytes
                                  MD5 hash:4F0F86315B42B8DAD8A1B430D5AC084A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low

                                  General

                                  Start time:13:02:28
                                  Start date:28/09/2021
                                  Path:C:\Users\user\Desktop\10377 APT800_B0205K0384.exe
                                  Wow64 process (32bit):true
                                  Commandline:{path}
                                  Imagebase:0x710000
                                  File size:1583616 bytes
                                  MD5 hash:4F0F86315B42B8DAD8A1B430D5AC084A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.930400215.0000000005620000.00000004.00020000.sdmp, Author: Joe Security
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.930218155.0000000005200000.00000004.00020000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.930218155.0000000005200000.00000004.00020000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.927919186.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.927919186.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.927919186.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.929668288.0000000003F17000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.929668288.0000000003F17000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  Reputation:low

                                  Disassembly

                                  Code Analysis

                                  Reset < >