Loading ...

Play interactive tourEdit tour

Windows Analysis Report PI.exe

Overview

General Information

Sample Name:PI.exe
Analysis ID:502697
MD5:59f7f57b8d6c0e55493eec56977d7cb4
SHA1:0740bebf070c16fca8aa5c0fada48edcc1bd9f12
SHA256:c932b6a0cbaa454668d2429d433fec76e7e544bb26b5bd1865a86aac4fa33434
Tags:agentteslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Machine Learning detection for sample
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Checks if the current process is being debugged
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • PI.exe (PID: 4596 cmdline: 'C:\Users\user\Desktop\PI.exe' MD5: 59F7F57B8D6C0E55493EEC56977D7CB4)
    • schtasks.exe (PID: 6840 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gBrGmFSvkGtF' /XML 'C:\Users\user\AppData\Local\Temp\tmpE100.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 7036 cmdline: {path} MD5: 2867A3817C9245F7CF518524DFD18F28)
    • RegSvcs.exe (PID: 7100 cmdline: {path} MD5: 2867A3817C9245F7CF518524DFD18F28)
      • WerFault.exe (PID: 4416 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7100 -s 1476 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • ZAYOk.exe (PID: 3796 cmdline: 'C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe' MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 5808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • ZAYOk.exe (PID: 7112 cmdline: 'C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe' MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 5268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "account@jeevalabs.com", "Password": "jeeva@123", "Host": "mail.jeevalabs.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000E.00000000.401899331.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000E.00000000.401899331.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          0000000E.00000002.429850923.0000000002FE1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 11 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            14.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              14.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                14.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  14.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    14.0.RegSvcs.exe.400000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 1 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 14.0.RegSvcs.exe.400000.1.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "account@jeevalabs.com", "Password": "jeeva@123", "Host": "mail.jeevalabs.com"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: PI.exeVirustotal: Detection: 25%Perma Link
                      Machine Learning detection for sampleShow sources
                      Source: PI.exeJoe Sandbox ML: detected
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\gBrGmFSvkGtF.exeJoe Sandbox ML: detected
                      Source: 14.0.RegSvcs.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                      Source: 14.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 14.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: PI.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: PI.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: rsaenh.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: RegSvcs.exe, 0000000E.00000000.401366087.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: System.ni.pdb% source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.ni.pdb" source: WerFault.exe, 0000001B.00000003.416122787.0000000005431000.00000004.00000040.sdmp
                      Source: Binary string: Microsoft.VisualBasic.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000001B.00000003.408012676.0000000004E2B000.00000004.00000001.sdmp
                      Source: Binary string: C:\Windows\RegSvcs.pdbpdbvcs.pdb source: RegSvcs.exe, 0000000E.00000000.401366087.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.PDB source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000001B.00000003.416339616.0000000005437000.00000004.00000040.sdmp
                      Source: Binary string: wbemcomn.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.pdbu source: RegSvcs.exe, 0000000E.00000002.430288250.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: RegSvcs.pdb source: ZAYOk.exe, ZAYOk.exe.14.dr
                      Source: Binary string: clr.pdb source: WerFault.exe, 0000001B.00000003.416421330.0000000005430000.00000004.00000040.sdmp
                      Source: Binary string: cryptsp.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: RegSvcs.pdbsoft.NET/Framework/v4.0.30319/RegSvcs.exerd source: RegSvcs.exe, 0000000E.00000000.401366087.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: advapi32.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: System.Configuration.ni.pdb" source: WerFault.exe, 0000001B.00000003.416213243.000000000544E000.00000004.00000001.sdmp
                      Source: Binary string: System.Configuration.ni.pdb% source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: Microsoft.VisualBasic.pdb source: WerFault.exe, 0000001B.00000003.416213243.000000000544E000.00000004.00000001.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: CLBCatQ.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: ntmarta.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Configuration.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: oC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.pdbrC source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: System.Windows.Forms.pdb4 source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000001B.00000003.416339616.0000000005437000.00000004.00000040.sdmp
                      Source: Binary string: mscorlib.ni.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: \??\C:\Windows\RegSvcs.pdb source: RegSvcs.exe, 0000000E.00000002.429361623.000000000150B000.00000004.00000001.sdmp
                      Source: Binary string: \??\C:\Windows\mscorlib.pdb source: RegSvcs.exe, 0000000E.00000002.429361623.000000000150B000.00000004.00000001.sdmp
                      Source: Binary string: sxs.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Xml.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: indows.Forms.pdb source: WerFault.exe, 0000001B.00000003.416122787.0000000005431000.00000004.00000040.sdmp
                      Source: Binary string: dwmapi.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: RegSvcs.PDB source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: mscoree.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: ws2_32.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: mscorlib.pdbMZ source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: indows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\shell32.dll.pdb source: RegSvcs.exe, 0000000E.00000002.429218819.0000000001466000.00000004.00000020.sdmp
                      Source: Binary string: shlwapi.pdbk source: WerFault.exe, 0000001B.00000003.416339616.0000000005437000.00000004.00000040.sdmp
                      Source: Binary string: System.Configuration.pdb" source: WerFault.exe, 0000001B.00000003.416213243.000000000544E000.00000004.00000001.sdmp
                      Source: Binary string: wbemdisp.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: RegSvcs.pdbegSvcs.pdbpdbvcs.pdbv4.0.30319\RegSvcs.pdb3062332-1002 source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 0000000E.00000002.430362962.00000000061E9000.00000004.00000001.sdmp, ZAYOk.exe, 00000013.00000000.377676212.00000000003C2000.00000002.00020000.sdmp, ZAYOk.exe, 00000017.00000000.395241960.0000000000F02000.00000002.00020000.sdmp, ZAYOk.exe.14.dr
                      Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 0000001B.00000003.416339616.0000000005437000.00000004.00000040.sdmp
                      Source: Binary string: powrprof.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: msvcr120_clr0400.i386.pdb% source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: mscorlib.ni.pdbRSDS source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.Configuration.pdb source: WerFault.exe, 0000001B.00000003.416213243.000000000544E000.00000004.00000001.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: ole32.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: mscorlib.ni.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: System.Configuration.pdbCustomMarshalers.dllCustomMarshalers.dll source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: mscorlib.pdb source: RegSvcs.exe, 0000000E.00000002.430288250.0000000006194000.00000004.00000001.sdmp, WerFault.exe, 0000001B.00000003.416144758.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: Windows.Storage.pdbW source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: combase.pdb source: WerFault.exe, 0000001B.00000003.416339616.0000000005437000.00000004.00000040.sdmp
                      Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Management.pdb source: WerFault.exe, 0000001B.00000003.416144758.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.pdb3 source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: \??\C:\Windows\symbols\exe\RegSvcs.pdb=G source: RegSvcs.exe, 0000000E.00000000.400534351.000000000150B000.00000004.00000001.sdmp
                      Source: Binary string: CustomMarshalers.pdbCA source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.Xml.ni.pdbRSDS source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: RegSvcs.pdbr source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: System.Core.ni.pdbRSDSD source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: mscorlib.ni.pdbW source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: diasymreader.pdb_ source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: RegSvcs.pdbj source: RegSvcs.exe, 0000000E.00000002.430288250.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: System.Management.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: mscoreei.pdbk source: WerFault.exe, 0000001B.00000003.416122787.0000000005431000.00000004.00000040.sdmp
                      Source: Binary string: mscorlib.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: wbemprox.pdbY source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: shcore.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Core.ni.pdb% source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000001B.00000003.416421330.0000000005430000.00000004.00000040.sdmp
                      Source: Binary string: fltLib.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Core.ni.pdb" source: WerFault.exe, 0000001B.00000003.416213243.000000000544E000.00000004.00000001.sdmp
                      Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: RegSvcs.exe, 0000000E.00000000.400421661.0000000001466000.00000004.00000020.sdmp
                      Source: Binary string: System.Core.ni.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: shell32.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.pdb0s source: RegSvcs.exe, 0000000E.00000002.430288250.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000001B.00000003.416421330.0000000005430000.00000004.00000040.sdmp
                      Source: Binary string: o0C:\Windows\RegSvcs.pdb source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: System.pdb66 source: WerFault.exe, 0000001B.00000003.416122787.0000000005431000.00000004.00000040.sdmp
                      Source: Binary string: wimm32.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Xml.ni.pdbT source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: cfgmgr32.pdbPhyCr source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: diasymreader.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: wUxTheme.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: wmiutils.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.ni.pdbT3 source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: System.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: .pdb source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: profapi.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbuW source: RegSvcs.exe, 0000000E.00000000.401366087.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: System.Xml.ni.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: symbols\exe\RegSvcs.pdbzX source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000001B.00000003.416421330.0000000005430000.00000004.00000040.sdmp
                      Source: Binary string: sechost.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: mscorlib.ni.pdb" source: WerFault.exe, 0000001B.00000003.416144758.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.ni.pdbRSDS source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: shcore.pdbVhcC source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: clrjit.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: wbemcomn.pdbw source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: msvcr120_clr0400.i386.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Configuration.ni.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: fastprox.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: wbemsvc.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: msctf.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: version.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: \??\C:\Windows\mscorlib.pdbKV source: RegSvcs.exe, 0000000E.00000002.429361623.000000000150B000.00000004.00000001.sdmp
                      Source: Binary string: CustomMarshalers.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.Xml.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.pdb source: WerFault.exe, 0000001B.00000003.416122787.0000000005431000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.Xml.pdb" source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Management.pdb" source: WerFault.exe, 0000001B.00000003.416144758.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Windows.Forms.pdb source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000001B.00000003.416421330.0000000005430000.00000004.00000040.sdmp
                      Source: Binary string: psapi.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: WMINet_Utils.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: System.Core.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: mscoreei.pdb source: WerFault.exe, 0000001B.00000003.416122787.0000000005431000.00000004.00000040.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.PDB source: RegSvcs.exe, 0000000E.00000002.430288250.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: combase.pdbk source: WerFault.exe, 0000001B.00000003.416339616.0000000005437000.00000004.00000040.sdmp
                      Source: Binary string: System.Core.pdb source: WerFault.exe, 0000001B.00000003.416213243.000000000544E000.00000004.00000001.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: \??\C:\Windows\exe\RegSvcs.pdb source: RegSvcs.exe, 0000000E.00000000.401366087.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: System.Windows.Forms.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: wuser32.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: Microsoft.VisualBasic.pdb" source: WerFault.exe, 0000001B.00000003.416213243.000000000544E000.00000004.00000001.sdmp
                      Source: Binary string: wbemprox.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.ni.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: Microsoft.VisualBasic.pdb source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.Core.pdbl source: WER86C6.tmp.dmp.27.dr
                      Source: RegSvcs.exe, 0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: RegSvcs.exe, 0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: RegSvcs.exe, 0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmpString found in binary or memory: http://bwoMKP.com
                      Source: WerFault.exe, 0000001B.00000003.425532451.0000000004D42000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authentication
                      Source: WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.o
                      Source: WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005
                      Source: WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
                      Source: WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200
                      Source: WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/locality
                      Source: WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephone
                      Source: WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
                      Source: WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphone
                      Source: WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/
                      Source: WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovince
                      Source: WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20
                      Source: WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/
                      Source: WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.o
                      Source: Amcache.hve.27.drString found in binary or memory: http://upx.sf.net
                      Source: RegSvcs.exe, 0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: WerFault.exe, 0000001B.00000002.427879512.0000000004E5C000.00000004.00000001.sdmpString found in binary or memory: https://watson.telemetry.m
                      Source: RegSvcs.exe, 0000000E.00000000.401899331.0000000000402000.00000040.00000001.sdmp, WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: RegSvcs.exe, 0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 14.0.RegSvcs.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007b3B464F1Cu002d6D38u002d4D62u002d82BBu002d984642A7F74Au007d/u003968FCA44u002dBFFBu002d4D3Eu002d9B95u002d6D42C6640E89.csLarge array initialization: .cctor: array initializer size 11957
                      Source: 14.2.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b3B464F1Cu002d6D38u002d4D62u002d82BBu002d984642A7F74Au007d/u003968FCA44u002dBFFBu002d4D3Eu002d9B95u002d6D42C6640E89.csLarge array initialization: .cctor: array initializer size 11957
                      Source: 14.0.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b3B464F1Cu002d6D38u002d4D62u002d82BBu002d984642A7F74Au007d/u003968FCA44u002dBFFBu002d4D3Eu002d9B95u002d6D42C6640E89.csLarge array initialization: .cctor: array initializer size 11957
                      Source: PI.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7100 -s 1476
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_02DD47A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_02DD3CCC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_02DD8168
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_02DD46B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_02DD5490
                      Source: PI.exe, 00000000.00000000.271353757.0000000000953000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamelpH3Mlb.exeD vs PI.exe
                      Source: PI.exeBinary or memory string: OriginalFilenamelpH3Mlb.exeD vs PI.exe
                      Source: PI.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: gBrGmFSvkGtF.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe 43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                      Source: PI.exeVirustotal: Detection: 25%
                      Source: C:\Users\user\Desktop\PI.exeFile read: C:\Users\user\Desktop\PI.exeJump to behavior
                      Source: PI.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\PI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\PI.exe 'C:\Users\user\Desktop\PI.exe'
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gBrGmFSvkGtF' /XML 'C:\Users\user\AppData\Local\Temp\tmpE100.tmp'
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe 'C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe'
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe 'C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe'
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7100 -s 1476
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gBrGmFSvkGtF' /XML 'C:\Users\user\AppData\Local\Temp\tmpE100.tmp'
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                      Source: C:\Users\user\Desktop\PI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PI.exeFile created: C:\Users\user\AppData\Roaming\gBrGmFSvkGtF.exeJump to behavior
                      Source: C:\Users\user\Desktop\PI.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE100.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@13/12@0/0
                      Source: C:\Users\user\Desktop\PI.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\PI.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5268:120:WilError_01
                      Source: C:\Users\user\Desktop\PI.exeMutant created: \Sessions\1\BaseNamedObjects\yfvuiREAIAv
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7100
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6924:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5808:120:WilError_01
                      Source: 14.0.RegSvcs.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 14.0.RegSvcs.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 14.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 14.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 14.0.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 14.0.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\PI.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: PI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: PI.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: rsaenh.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: RegSvcs.exe, 0000000E.00000000.401366087.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: System.ni.pdb% source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.ni.pdb" source: WerFault.exe, 0000001B.00000003.416122787.0000000005431000.00000004.00000040.sdmp
                      Source: Binary string: Microsoft.VisualBasic.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000001B.00000003.408012676.0000000004E2B000.00000004.00000001.sdmp
                      Source: Binary string: C:\Windows\RegSvcs.pdbpdbvcs.pdb source: RegSvcs.exe, 0000000E.00000000.401366087.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.PDB source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000001B.00000003.416339616.0000000005437000.00000004.00000040.sdmp
                      Source: Binary string: wbemcomn.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.pdbu source: RegSvcs.exe, 0000000E.00000002.430288250.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: RegSvcs.pdb source: ZAYOk.exe, ZAYOk.exe.14.dr
                      Source: Binary string: clr.pdb source: WerFault.exe, 0000001B.00000003.416421330.0000000005430000.00000004.00000040.sdmp
                      Source: Binary string: cryptsp.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: RegSvcs.pdbsoft.NET/Framework/v4.0.30319/RegSvcs.exerd source: RegSvcs.exe, 0000000E.00000000.401366087.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: advapi32.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: System.Configuration.ni.pdb" source: WerFault.exe, 0000001B.00000003.416213243.000000000544E000.00000004.00000001.sdmp
                      Source: Binary string: System.Configuration.ni.pdb% source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: Microsoft.VisualBasic.pdb source: WerFault.exe, 0000001B.00000003.416213243.000000000544E000.00000004.00000001.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: CLBCatQ.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: ntmarta.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Configuration.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: oC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.pdbrC source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: System.Windows.Forms.pdb4 source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000001B.00000003.416339616.0000000005437000.00000004.00000040.sdmp
                      Source: Binary string: mscorlib.ni.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: \??\C:\Windows\RegSvcs.pdb source: RegSvcs.exe, 0000000E.00000002.429361623.000000000150B000.00000004.00000001.sdmp
                      Source: Binary string: \??\C:\Windows\mscorlib.pdb source: RegSvcs.exe, 0000000E.00000002.429361623.000000000150B000.00000004.00000001.sdmp
                      Source: Binary string: sxs.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Xml.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: indows.Forms.pdb source: WerFault.exe, 0000001B.00000003.416122787.0000000005431000.00000004.00000040.sdmp
                      Source: Binary string: dwmapi.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: RegSvcs.PDB source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: mscoree.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: ws2_32.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: mscorlib.pdbMZ source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: indows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\shell32.dll.pdb source: RegSvcs.exe, 0000000E.00000002.429218819.0000000001466000.00000004.00000020.sdmp
                      Source: Binary string: shlwapi.pdbk source: WerFault.exe, 0000001B.00000003.416339616.0000000005437000.00000004.00000040.sdmp
                      Source: Binary string: System.Configuration.pdb" source: WerFault.exe, 0000001B.00000003.416213243.000000000544E000.00000004.00000001.sdmp
                      Source: Binary string: wbemdisp.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: RegSvcs.pdbegSvcs.pdbpdbvcs.pdbv4.0.30319\RegSvcs.pdb3062332-1002 source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 0000000E.00000002.430362962.00000000061E9000.00000004.00000001.sdmp, ZAYOk.exe, 00000013.00000000.377676212.00000000003C2000.00000002.00020000.sdmp, ZAYOk.exe, 00000017.00000000.395241960.0000000000F02000.00000002.00020000.sdmp, ZAYOk.exe.14.dr
                      Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 0000001B.00000003.416339616.0000000005437000.00000004.00000040.sdmp
                      Source: Binary string: powrprof.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: msvcr120_clr0400.i386.pdb% source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: mscorlib.ni.pdbRSDS source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.Configuration.pdb source: WerFault.exe, 0000001B.00000003.416213243.000000000544E000.00000004.00000001.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: ole32.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: mscorlib.ni.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: System.Configuration.pdbCustomMarshalers.dllCustomMarshalers.dll source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: mscorlib.pdb source: RegSvcs.exe, 0000000E.00000002.430288250.0000000006194000.00000004.00000001.sdmp, WerFault.exe, 0000001B.00000003.416144758.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: Windows.Storage.pdbW source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: combase.pdb source: WerFault.exe, 0000001B.00000003.416339616.0000000005437000.00000004.00000040.sdmp
                      Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Management.pdb source: WerFault.exe, 0000001B.00000003.416144758.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.pdb3 source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: \??\C:\Windows\symbols\exe\RegSvcs.pdb=G source: RegSvcs.exe, 0000000E.00000000.400534351.000000000150B000.00000004.00000001.sdmp
                      Source: Binary string: CustomMarshalers.pdbCA source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.Xml.ni.pdbRSDS source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: RegSvcs.pdbr source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: System.Core.ni.pdbRSDSD source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: mscorlib.ni.pdbW source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: diasymreader.pdb_ source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: RegSvcs.pdbj source: RegSvcs.exe, 0000000E.00000002.430288250.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: System.Management.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: mscoreei.pdbk source: WerFault.exe, 0000001B.00000003.416122787.0000000005431000.00000004.00000040.sdmp
                      Source: Binary string: mscorlib.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: wbemprox.pdbY source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: shcore.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Core.ni.pdb% source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000001B.00000003.416421330.0000000005430000.00000004.00000040.sdmp
                      Source: Binary string: fltLib.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Core.ni.pdb" source: WerFault.exe, 0000001B.00000003.416213243.000000000544E000.00000004.00000001.sdmp
                      Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: RegSvcs.exe, 0000000E.00000000.400421661.0000000001466000.00000004.00000020.sdmp
                      Source: Binary string: System.Core.ni.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: shell32.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.pdb0s source: RegSvcs.exe, 0000000E.00000002.430288250.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000001B.00000003.416421330.0000000005430000.00000004.00000040.sdmp
                      Source: Binary string: o0C:\Windows\RegSvcs.pdb source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: System.pdb66 source: WerFault.exe, 0000001B.00000003.416122787.0000000005431000.00000004.00000040.sdmp
                      Source: Binary string: wimm32.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Xml.ni.pdbT source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: cfgmgr32.pdbPhyCr source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: diasymreader.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: wUxTheme.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: wmiutils.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.ni.pdbT3 source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: System.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: .pdb source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: profapi.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbuW source: RegSvcs.exe, 0000000E.00000000.401366087.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: System.Xml.ni.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: symbols\exe\RegSvcs.pdbzX source: RegSvcs.exe, 0000000E.00000000.402155896.00000000010F8000.00000004.00000001.sdmp
                      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000001B.00000003.416421330.0000000005430000.00000004.00000040.sdmp
                      Source: Binary string: sechost.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: mscorlib.ni.pdb" source: WerFault.exe, 0000001B.00000003.416144758.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.ni.pdbRSDS source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: shcore.pdbVhcC source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: clrjit.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: wbemcomn.pdbw source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: msvcr120_clr0400.i386.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Configuration.ni.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: fastprox.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: wbemsvc.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: msctf.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: version.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: \??\C:\Windows\mscorlib.pdbKV source: RegSvcs.exe, 0000000E.00000002.429361623.000000000150B000.00000004.00000001.sdmp
                      Source: Binary string: CustomMarshalers.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.Xml.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.pdb source: WerFault.exe, 0000001B.00000003.416122787.0000000005431000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.Xml.pdb" source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Management.pdb" source: WerFault.exe, 0000001B.00000003.416144758.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.Windows.Forms.pdb source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000001B.00000003.416421330.0000000005430000.00000004.00000040.sdmp
                      Source: Binary string: psapi.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: WMINet_Utils.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: System.Core.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000001B.00000003.416271285.00000000052C1000.00000004.00000001.sdmp
                      Source: Binary string: mscoreei.pdb source: WerFault.exe, 0000001B.00000003.416122787.0000000005431000.00000004.00000040.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.PDB source: RegSvcs.exe, 0000000E.00000002.430288250.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: combase.pdbk source: WerFault.exe, 0000001B.00000003.416339616.0000000005437000.00000004.00000040.sdmp
                      Source: Binary string: System.Core.pdb source: WerFault.exe, 0000001B.00000003.416213243.000000000544E000.00000004.00000001.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: \??\C:\Windows\exe\RegSvcs.pdb source: RegSvcs.exe, 0000000E.00000000.401366087.0000000006194000.00000004.00000001.sdmp
                      Source: Binary string: System.Windows.Forms.pdbx source: WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp
                      Source: Binary string: wuser32.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: Microsoft.VisualBasic.pdb" source: WerFault.exe, 0000001B.00000003.416213243.000000000544E000.00000004.00000001.sdmp
                      Source: Binary string: wbemprox.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp
                      Source: Binary string: System.ni.pdb source: WerFault.exe, 0000001B.00000003.416457054.000000000543A000.00000004.00000040.sdmp, WER86C6.tmp.dmp.27.dr
                      Source: Binary string: Microsoft.VisualBasic.pdb source: WER86C6.tmp.dmp.27.dr
                      Source: Binary string: System.Core.pdbl source: WER86C6.tmp.dmp.27.dr
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.07928703549
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.07928703549
                      Source: C:\Users\user\Desktop\PI.exeFile created: C:\Users\user\AppData\Roaming\gBrGmFSvkGtF.exeJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeJump to dropped file

                      Boot Survival:

                      barindex
                      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gBrGmFSvkGtF' /XML 'C:\Users\user\AppData\Local\Temp\tmpE100.tmp'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ZAYOkJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ZAYOkJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe:Zone.Identifier read attributes | delete
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\PI.exe TID: 4532Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe TID: 4576Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe TID: 5936Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\PI.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9744
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PI.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeThread delayed: delay time: 922337203685477
                      Source: Amcache.hve.27.drBinary or memory string: VMware
                      Source: Amcache.hve.27.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                      Source: Amcache.hve.27.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: Amcache.hve.27.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.27.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.27.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
                      Source: Amcache.hve.27.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.27.drBinary or memory string: VMware7,1
                      Source: Amcache.hve.27.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.27.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.27.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: WerFault.exe, 0000001B.00000002.427731467.0000000004D30000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.27.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.27.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.27.drBinary or memory string: VMware, Inc.me
                      Source: Amcache.hve.27.drBinary or memory string: VMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7
                      Source: Amcache.hve.27.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: Amcache.hve.27.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                      Source: C:\Users\user\Desktop\PI.exeProcess token adjusted: Debug
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPort
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPort
                      Source: C:\Users\user\Desktop\PI.exeMemory allocated: page read and write | page guard
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gBrGmFSvkGtF' /XML 'C:\Users\user\AppData\Local\Temp\tmpE100.tmp'
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                      Source: RegSvcs.exe, 0000000E.00000000.400656663.00000000019C0000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: RegSvcs.exe, 0000000E.00000000.400656663.00000000019C0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: RegSvcs.exe, 0000000E.00000000.400656663.00000000019C0000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: RegSvcs.exe, 0000000E.00000000.400656663.00000000019C0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Users\user\Desktop\PI.exe VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeQueries volume information: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeQueries volume information: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: Amcache.hve.27.drBinary or memory string: c:\users\user\desktop\procexp.exe
                      Source: Amcache.hve.27.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.27.drBinary or memory string: procexp.exe

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 14.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000000.401899331.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.428455338.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000000.399708702.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.429850923.0000000002FE1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000000.403049754.0000000002FE1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7100, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: WerFault.exe PID: 4416, type: MEMORYSTR
                      Source: Yara matchFile source: 0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.429850923.0000000002FE1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000000.403049754.0000000002FE1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7100, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 14.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000000.401899331.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.428455338.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000000.399708702.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.429850923.0000000002FE1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000000.403049754.0000000002FE1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7100, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: WerFault.exe PID: 4416, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection12Masquerading1OS Credential DumpingSecurity Software Discovery131Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1Registry Run Keys / Startup Folder1Scheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder1Virtualization/Sandbox Evasion141Security Account ManagerVirtualization/Sandbox Evasion141SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information1DCSyncSystem Information Discovery113Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing2Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 502697 Sample: PI.exe Startdate: 14/10/2021 Architecture: WINDOWS Score: 100 37 Found malware configuration 2->37 39 Multi AV Scanner detection for submitted file 2->39 41 Yara detected AgentTesla 2->41 43 3 other signatures 2->43 7 PI.exe 6 2->7         started        11 ZAYOk.exe 2 2->11         started        13 ZAYOk.exe 1 2->13         started        process3 file4 33 C:\Users\user\AppData\...\gBrGmFSvkGtF.exe, PE32 7->33 dropped 35 C:\Users\user\AppData\Local\...\PI.exe.log, ASCII 7->35 dropped 45 Uses schtasks.exe or at.exe to add and modify task schedules 7->45 15 RegSvcs.exe 7->15         started        18 RegSvcs.exe 2 4 7->18         started        21 schtasks.exe 1 7->21         started        23 conhost.exe 11->23         started        25 conhost.exe 13->25         started        signatures5 process6 file7 47 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 15->47 49 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 15->49 31 C:\Users\user\AppData\Roaming\...\ZAYOk.exe, PE32 18->31 dropped 51 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->51 27 WerFault.exe 23 9 18->27         started        29 conhost.exe 21->29         started        signatures8 process9

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      PI.exe26%VirustotalBrowse
                      PI.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\gBrGmFSvkGtF.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe0%VirustotalBrowse
                      C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe0%MetadefenderBrowse
                      C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe0%ReversingLabs

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      14.0.RegSvcs.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                      14.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      14.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://watson.telemetry.m0%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://bwoMKP.com0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      No contacted domains info

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifierWerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpfalse
                          high
                          http://127.0.0.1:HTTP/1.1RegSvcs.exe, 0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://DynDns.comDynDNSRegSvcs.exe, 0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.oWerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysidWerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpfalse
                                high
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegSvcs.exe, 0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.oWerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpfalse
                                  high
                                  https://watson.telemetry.mWerFault.exe, 0000001B.00000002.427879512.0000000004E5C000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphoneWerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephoneWerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpfalse
                                      high
                                      https://api.ipify.org%GETMozilla/5.0RegSvcs.exe, 0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      low
                                      http://upx.sf.netAmcache.hve.27.drfalse
                                        high
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovinceWerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpfalse
                                          high
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpfalse
                                            high
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameWerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpfalse
                                              high
                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpfalse
                                                high
                                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipRegSvcs.exe, 0000000E.00000000.401899331.0000000000402000.00000040.00000001.sdmp, WerFault.exe, 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://bwoMKP.comRegSvcs.exe, 0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/WerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authenticationWerFault.exe, 0000001B.00000003.414423473.0000000005630000.00000004.00000001.sdmpfalse
                                                    high

                                                    Contacted IPs

                                                    No contacted IP infos

                                                    General Information

                                                    Joe Sandbox Version:33.0.0 White Diamond
                                                    Analysis ID:502697
                                                    Start date:14.10.2021
                                                    Start time:10:17:10
                                                    Joe Sandbox Product:CloudBasic
                                                    Overall analysis duration:0h 8m 7s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:light
                                                    Sample file name:PI.exe
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                    Number of analysed new started processes analysed:33
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • HDC enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Detection:MAL
                                                    Classification:mal100.troj.evad.winEXE@13/12@0/0
                                                    EGA Information:Failed
                                                    HDC Information:Failed
                                                    HCA Information:
                                                    • Successful, ratio: 100%
                                                    • Number of executed functions: 0
                                                    • Number of non-executed functions: 0
                                                    Cookbook Comments:
                                                    • Adjust boot time
                                                    • Enable AMSI
                                                    • Found application associated with file extension: .exe
                                                    Warnings:
                                                    Show All
                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                    • Excluded IPs from analysis (whitelisted): 95.100.216.89, 20.82.209.183, 20.54.110.249, 40.112.88.60, 52.251.79.25, 2.20.178.10, 2.20.178.56, 20.199.120.85, 2.20.178.24, 2.20.178.33, 20.190.160.8, 20.190.160.4, 20.190.160.67, 20.190.160.136, 20.190.160.129, 20.190.160.132, 20.190.160.2, 20.190.160.75, 20.189.173.22, 20.199.120.151, 20.199.120.182
                                                    • Excluded domains from analysis (whitelisted): consumer-displaycatalogrp-aks2aks-useast.md.mp.microsoft.com.akadns.net, www.tm.lg.prod.aadmsa.akadns.net, onedsblobprdwus17.westus.cloudapp.azure.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, wns.notify.trafficmanager.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, login.live.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, wu-shim.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, eus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, www.tm.a.prd.aadg.akadns.net, login.msa.msidentity.com, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, displaycatalog-rp-useast.md.mp.microsoft.com.akadns.net, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • Report size getting too big, too many NtSetInformationFile calls found.

                                                    Simulations

                                                    Behavior and APIs

                                                    TimeTypeDescription
                                                    10:18:18API Interceptor2x Sleep call for process: PI.exe modified
                                                    10:18:29API Interceptor242x Sleep call for process: RegSvcs.exe modified
                                                    10:18:39AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ZAYOk C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe
                                                    10:18:47AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ZAYOk C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe
                                                    10:19:10API Interceptor1x Sleep call for process: WerFault.exe modified

                                                    Joe Sandbox View / Context

                                                    IPs

                                                    No context

                                                    Domains

                                                    No context

                                                    ASN

                                                    No context

                                                    JA3 Fingerprints

                                                    No context

                                                    Dropped Files

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exeInvoice.exeGet hashmaliciousBrowse
                                                      sale order.exeGet hashmaliciousBrowse
                                                        XnQ8NBKkhW.exeGet hashmaliciousBrowse
                                                          DEBIT NOTE.exeGet hashmaliciousBrowse
                                                            FAj7shxXukkNrTk.exeGet hashmaliciousBrowse
                                                              ameHrrFwNp.exeGet hashmaliciousBrowse
                                                                gNFfZ1w8E6.exeGet hashmaliciousBrowse
                                                                  YdACOWCggQ.exeGet hashmaliciousBrowse
                                                                    Swift copy.exeGet hashmaliciousBrowse
                                                                      KRSEL0000056286.JPG.exeGet hashmaliciousBrowse
                                                                        tT5M57z8XiwLwf5.exeGet hashmaliciousBrowse
                                                                          SecuriteInfo.com.Suspicious.Win32.Save.a.7200.exeGet hashmaliciousBrowse
                                                                            Purchase order.exeGet hashmaliciousBrowse
                                                                              21ITQXL080104122T7.exeGet hashmaliciousBrowse
                                                                                COSCOSH SHANGHAI SHIP MANAGEMENT CO LTD.exeGet hashmaliciousBrowse
                                                                                  319-7359-01#U00a0BL#U00a0DRAFT.exeGet hashmaliciousBrowse
                                                                                    HSBc20210216B1.exeGet hashmaliciousBrowse
                                                                                      BANK INFORMATION.exeGet hashmaliciousBrowse
                                                                                        PO.2100002.exeGet hashmaliciousBrowse
                                                                                          dorlla.exeGet hashmaliciousBrowse

                                                                                            Created / dropped Files

                                                                                            C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RegSvcs.exe_35438265e855fa13c91512473cf11ea89278e4e6_7bbe79f8_10581952\Report.wer
                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                            File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):65536
                                                                                            Entropy (8bit):1.1249008109565173
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:WUXGXokHBUZMXaaPXvJCMyZ/u7sJS274Itx:B24sBUZMXaapPyZ/u7sJX4Itx
                                                                                            MD5:5B47E1903A6AD48CBD078BA84F012701
                                                                                            SHA1:D53BA8F16B5B4F5124A750780A1A821998131DEB
                                                                                            SHA-256:B925BB96C0ECE0DD097737142CDC11E48E11C9FC4C66D841D980D95C72E69833
                                                                                            SHA-512:6A002C6E33389D8D4CBEB7DAD81567B7DF19DCDEEE84D4C12C29D37597AD469A9C269D29E8A6433C5AB65E3D54132976B869C2B08839C2FDAEF8DFE73850CFB7
                                                                                            Malicious:false
                                                                                            Reputation:low
                                                                                            Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.2.7.8.7.0.5.5.4.3.0.0.8.9.5.4.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.7.8.7.0.5.5.4.9.1.1.8.3.0.9.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.5.7.0.8.4.b.d.-.8.1.5.1.-.4.d.b.d.-.b.a.9.4.-.4.1.9.b.6.f.b.a.b.8.4.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.3.2.6.4.b.4.8.-.7.1.5.0.-.4.1.b.3.-.a.5.9.d.-.6.2.1.b.a.d.9.a.7.4.e.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.R.e.g.S.v.c.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.e.g.S.v.c.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.b.c.-.0.0.0.1.-.0.0.1.c.-.a.3.9.9.-.c.9.7.c.1.f.c.1.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.7.b.a.2.a.1.1.1.c.e.d.d.5.b.f.5.2.3.2.2.4.b.3.f.1.c.f.e.5.8.e.e.c.7.c.2.f.d.c.
                                                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WER86C6.tmp.dmp
                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                            File Type:Mini DuMP crash report, 15 streams, Thu Oct 14 17:19:05 2021, 0x1205a4 type
                                                                                            Category:dropped
                                                                                            Size (bytes):299872
                                                                                            Entropy (8bit):3.6562294785263716
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:GHtGjd+pwTir09mmUCgU5yt09gIOgF5wuoX0NThBS0mXYEei:MzpKmHmTjT9RpDVymTK0
                                                                                            MD5:7640E16B16410224E445F4175123A31D
                                                                                            SHA1:E5EDBBCFD525D7DD20AD8ECB4C677964DFE2EF33
                                                                                            SHA-256:DE47BC341644CF2AE755017DCCFDA1B09108DA4A111803BCEB9D7AB5CD2D98A7
                                                                                            SHA-512:D11C3B6C62C63E1C1139A397EFCBBDAC4A54FA2C9177035D7A6F6B670F8A8011CD02F9469520BBFA3EEDBD733C9A307FB520D61CDACDE87B75D0B29B864C9F0D
                                                                                            Malicious:false
                                                                                            Reputation:low
                                                                                            Preview: MDMP....... ........fha....................................$...x#......t(..xW..........`.......8...........T...........X:...Y...........#...........%...................................................................U...........B...... &......GenuineIntelW...........T...........]fha.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WER9473.tmp.WERInternalMetadata.xml
                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                            File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):8360
                                                                                            Entropy (8bit):3.7043128360777016
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:Rrl7r3GLNiK66xc896Ycs6V4gmfZUYSBCprk89bnasf0aNm:RrlsNiv6Gm6Y/6qgmfGYSAn5fQ
                                                                                            MD5:D89D3E79B4259C421D751131D4166120
                                                                                            SHA1:6CFE55C41E2DF77DD8E5C2EC129C3C1CF83D8F35
                                                                                            SHA-256:593867FE59390C42B39E7550E004FE87E008A01A0517130E65834DC6CD6C2178
                                                                                            SHA-512:FD19FD2D2E7ED43EC79B5B48EA7B96257259C3041B1BE4ACB3B51B866562D574ED92F8B30C3C55B781003F578FBB631CC19FE8F94E1ADEE05C2F3579176A5FC1
                                                                                            Malicious:false
                                                                                            Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.0.0.<./.P.i.d.>.......
                                                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WER97A1.tmp.xml
                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):4741
                                                                                            Entropy (8bit):4.502176438941949
                                                                                            Encrypted:false
                                                                                            SSDEEP:48:cvIwSD8zsZiJgtWI9x9WSC8Bo8fm8M4JSD8Fk1+q8vrDSP7Md:uITfuqMSN7JCKqP7Md
                                                                                            MD5:6FBCF6C984AD30C4B94DC01962D35E91
                                                                                            SHA1:C181F364FC8E823DFD39DAD1E81172C340649128
                                                                                            SHA-256:7E00DEE04E2A406D26DDEC863FBB5AA11FC9DDB0C844AFB94780194189D77D55
                                                                                            SHA-512:EED54727E3ACE282CD882B3B9B53B97708D7C72B09A186EB73D762CB028A599C2E1F64025C2F8CA3DB1AB7F8825B5C21FBA6D2479C424FA729B7B880CAD62563
                                                                                            Malicious:false
                                                                                            Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1209749" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PI.exe.log
                                                                                            Process:C:\Users\user\Desktop\PI.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):1216
                                                                                            Entropy (8bit):5.355304211458859
                                                                                            Encrypted:false
                                                                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                                                            MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                                                            SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                                                            SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                                                            SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                                                            Malicious:true
                                                                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ZAYOk.exe.log
                                                                                            Process:C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:modified
                                                                                            Size (bytes):142
                                                                                            Entropy (8bit):5.090621108356562
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                                                            MD5:8C0458BB9EA02D50565175E38D577E35
                                                                                            SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                                                            SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                                                            SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                                                            Malicious:false
                                                                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                            C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe
                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                            File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):45152
                                                                                            Entropy (8bit):6.149629800481177
                                                                                            Encrypted:false
                                                                                            SSDEEP:768:bBbSoy+SdIBf0k2dsYyV6Iq87PiU9FViaLmf:EoOIBf0ddsYy8LUjVBC
                                                                                            MD5:2867A3817C9245F7CF518524DFD18F28
                                                                                            SHA1:D7BA2A111CEDD5BF523224B3F1CFE58EEC7C2FDC
                                                                                            SHA-256:43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                                                                                            SHA-512:7D3D3DBB42B7966644D716AA9CBC75327B2ACB02E43C61F1DAD4AFE5521F9FE248B33347DFE15B637FB33EB97CDB322BCAEAE08BAE3F2FD863A9AD9B3A4D6B42
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Joe Sandbox View:
                                                                                            • Filename: Invoice.exe, Detection: malicious, Browse
                                                                                            • Filename: sale order.exe, Detection: malicious, Browse
                                                                                            • Filename: XnQ8NBKkhW.exe, Detection: malicious, Browse
                                                                                            • Filename: DEBIT NOTE.exe, Detection: malicious, Browse
                                                                                            • Filename: FAj7shxXukkNrTk.exe, Detection: malicious, Browse
                                                                                            • Filename: ameHrrFwNp.exe, Detection: malicious, Browse
                                                                                            • Filename: gNFfZ1w8E6.exe, Detection: malicious, Browse
                                                                                            • Filename: YdACOWCggQ.exe, Detection: malicious, Browse
                                                                                            • Filename: Swift copy.exe, Detection: malicious, Browse
                                                                                            • Filename: KRSEL0000056286.JPG.exe, Detection: malicious, Browse
                                                                                            • Filename: tT5M57z8XiwLwf5.exe, Detection: malicious, Browse
                                                                                            • Filename: SecuriteInfo.com.Suspicious.Win32.Save.a.7200.exe, Detection: malicious, Browse
                                                                                            • Filename: Purchase order.exe, Detection: malicious, Browse
                                                                                            • Filename: 21ITQXL080104122T7.exe, Detection: malicious, Browse
                                                                                            • Filename: COSCOSH SHANGHAI SHIP MANAGEMENT CO LTD.exe, Detection: malicious, Browse
                                                                                            • Filename: 319-7359-01#U00a0BL#U00a0DRAFT.exe, Detection: malicious, Browse
                                                                                            • Filename: HSBc20210216B1.exe, Detection: malicious, Browse
                                                                                            • Filename: BANK INFORMATION.exe, Detection: malicious, Browse
                                                                                            • Filename: PO.2100002.exe, Detection: malicious, Browse
                                                                                            • Filename: dorlla.exe, Detection: malicious, Browse
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...zX.Z..............0..d..........V.... ........@.. ..............................."....`.....................................O.......8............r..`>.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                                                            C:\Users\user\AppData\Roaming\gBrGmFSvkGtF.exe
                                                                                            Process:C:\Users\user\Desktop\PI.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):1017344
                                                                                            Entropy (8bit):7.047914763902751
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:aKTHWBTmCzo/MOxAS0x78YIOIX9C/HpdprYmCC9jB:amHqzo/MOsIrNC/PpE
                                                                                            MD5:59F7F57B8D6C0E55493EEC56977D7CB4
                                                                                            SHA1:0740BEBF070C16FCA8AA5C0FADA48EDCC1BD9F12
                                                                                            SHA-256:C932B6A0CBAA454668D2429D433FEC76E7E544BB26B5BD1865A86AAC4FA33434
                                                                                            SHA-512:259D52573BB4F97A4D9158D2D2F53B4EA6CEE27EFBC8E7FFE4962AE705EB36D220E19BABEE78B3737E3E5BC0AB99DECFC6C977AA99FAF4C1ABC9E445EABB3E62
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....ga..............P..2...R.......Q... ...`....@.. ....................................@.................................pQ..O....`...N........................................................................... ............... ..H............text....1... ...2.................. ..`.rsrc....N...`...P...4..............@..@.reloc..............................@..B.................Q......H........................c................................................(1...*&..(2....*.s3........s4........s5........s6........s7........*...0...........~....o8....+..*.0...........~....o9....+..*.0...........~....o:....+..*.0...........~....o;....+..*.0...........~....o<....+..*&..(=....*...0..<........~.....(>.....,!r...p.....(?...o@...sA............~.....+..*.0...........~.....+..*".......*.0...........(....r5..p~....oB....+..*...0..<........~.....(>.....,!rE..p.....(?
                                                                                            C:\Windows\appcompat\Programs\Amcache.hve
                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                            File Type:MS Windows registry file, NT/2000 or above
                                                                                            Category:dropped
                                                                                            Size (bytes):1572864
                                                                                            Entropy (8bit):4.279387964724438
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:3K2zoKwkpljKIC3TZoKHf9B46Q0WpZNpjhzQQnXRqCs0NpLylYuLJ:a2zoKwkpljKIC3BH
                                                                                            MD5:D3CA24D1EFB866BB21CA1588B12B148B
                                                                                            SHA1:26416753CC2340221E2C478EBF7AED8FF2A21892
                                                                                            SHA-256:2A01FE7A500E026A2D076DC95D4135CAC5A189B6D1318366F36FA2AFED44045B
                                                                                            SHA-512:7B92607D0E4BDFF5E818180BDC2A4B736168FA61F40D312D7F5DA6DF65E75E8B5EBC50C0B2C4C4B314A01CED63B4E662E50DD3A7C0464AA1526EF9945DD67C9E
                                                                                            Malicious:false
                                                                                            Preview: regfZ...Z...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtmr..................................................................................................................................................................................................................................................................................................................................................-...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Windows\appcompat\Programs\Amcache.hve.LOG1
                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                            File Type:MS Windows registry file, NT/2000 or above
                                                                                            Category:dropped
                                                                                            Size (bytes):24576
                                                                                            Entropy (8bit):4.0411801016140165
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:lwXF5Rftx1DPJ4XgsF8nm7k8PBqXTSeq5QMVyi6+/rl4Lk4PZd1DoXzKLZy7qE:uX7Rftx17J4XlF8m7FBqXGeq5QMVyi6b
                                                                                            MD5:95A35997F577416D1A0BBC9E306F281A
                                                                                            SHA1:E66158F54C06E796A04BD40B90402BBBB27C33E8
                                                                                            SHA-256:F7349D9173117B3B571F30B44F0D684B975F1DB4A4DB8C2906354803B13D0B35
                                                                                            SHA-512:A59CF9163E18755FCE817FE42855F4C7549BC2FD5D0FDF2480E7DE2B8415364922C3E4C1F71AF2C1D2586698D47F76F117DC246FA48ED0CE4F375CEC0D6CC821
                                                                                            Malicious:false
                                                                                            Preview: regfY...Y...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtmr..................................................................................................................................................................................................................................................................................................................................................+...HvLE.^......Y...........V..9U.2...$..d..........0................... ..hbin................p.\..,..........nk,........................................ ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk ............ ........................... .......Z.......................Root........lf......Root....nk .........................}.............. ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck...
                                                                                            \Device\ConDrv
                                                                                            Process:C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):1141
                                                                                            Entropy (8bit):4.44831826838854
                                                                                            Encrypted:false
                                                                                            SSDEEP:24:zKLXkb4DObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0b4DQntKKH1MqJC
                                                                                            MD5:1AEB3A784552CFD2AEDEDC1D43A97A4F
                                                                                            SHA1:804286AB9F8B3DE053222826A69A7CDA3492411A
                                                                                            SHA-256:0BC438F4B1208E1390C12D375B6CBB08BF47599D1F24BD07799BB1DF384AA293
                                                                                            SHA-512:5305059BA86D5C2185E590EC036044B2A17ED9FD9863C2E3C7E7D8035EF0C79E53357AF5AE735F7D432BC70156D4BD3ACB42D100CFB05C2FB669EA22368F1415
                                                                                            Malicious:false
                                                                                            Preview: Microsoft (R) .NET Framework Services Installation Utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c

                                                                                            Static File Info

                                                                                            General

                                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                            Entropy (8bit):7.047914763902751
                                                                                            TrID:
                                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                            • DOS Executable Generic (2002/1) 0.01%
                                                                                            File name:PI.exe
                                                                                            File size:1017344
                                                                                            MD5:59f7f57b8d6c0e55493eec56977d7cb4
                                                                                            SHA1:0740bebf070c16fca8aa5c0fada48edcc1bd9f12
                                                                                            SHA256:c932b6a0cbaa454668d2429d433fec76e7e544bb26b5bd1865a86aac4fa33434
                                                                                            SHA512:259d52573bb4f97a4d9158d2d2f53b4ea6cee27efbc8e7ffe4962ae705eb36d220e19babee78b3737e3e5bc0ab99decfc6c977aa99faf4c1abc9e445eabb3e62
                                                                                            SSDEEP:12288:aKTHWBTmCzo/MOxAS0x78YIOIX9C/HpdprYmCC9jB:amHqzo/MOsIrNC/PpE
                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ga..............P..2...R.......Q... ...`....@.. ....................................@................................

                                                                                            File Icon

                                                                                            Icon Hash:8088a2a692fa3e80

                                                                                            Static PE Info

                                                                                            General

                                                                                            Entrypoint:0x4c51c2
                                                                                            Entrypoint Section:.text
                                                                                            Digitally signed:false
                                                                                            Imagebase:0x400000
                                                                                            Subsystem:windows gui
                                                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                            Time Stamp:0x616789D1 [Thu Oct 14 01:37:21 2021 UTC]
                                                                                            TLS Callbacks:
                                                                                            CLR (.Net) Version:v4.0.30319
                                                                                            OS Version Major:4
                                                                                            OS Version Minor:0
                                                                                            File Version Major:4
                                                                                            File Version Minor:0
                                                                                            Subsystem Version Major:4
                                                                                            Subsystem Version Minor:0
                                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                            Entrypoint Preview

                                                                                            Instruction
                                                                                            jmp dword ptr [00402000h]
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al

                                                                                            Data Directories

                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc51700x4f.text
                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc60000x34ec4.rsrc
                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xfc0000xc.reloc
                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                            Sections

                                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                            .text0x20000xc31c80xc3200False0.609131015775data7.07928703549IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                            .rsrc0xc60000x34ec40x35000False0.535962374705data6.0369770148IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .reloc0xfc0000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                            Resources

                                                                                            NameRVASizeTypeLanguageCountry
                                                                                            RT_ICON0xc62b00xceafPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                                            RT_ICON0xd31600x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                                                                                            RT_ICON0xe39880x94a8data
                                                                                            RT_ICON0xece300x5488data
                                                                                            RT_ICON0xf22b80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295
                                                                                            RT_ICON0xf64e00x25a8data
                                                                                            RT_ICON0xf8a880x10a8data
                                                                                            RT_ICON0xf9b300x988data
                                                                                            RT_ICON0xfa4b80x468GLS_BINARY_LSB_FIRST
                                                                                            RT_GROUP_ICON0xfa9200x84data
                                                                                            RT_VERSION0xfa9a40x334data
                                                                                            RT_MANIFEST0xfacd80x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                            Imports

                                                                                            DLLImport
                                                                                            mscoree.dll_CorExeMain

                                                                                            Version Infos

                                                                                            DescriptionData
                                                                                            Translation0x0000 0x04b0
                                                                                            LegalCopyrightCopyright 2009
                                                                                            Assembly Version1.0.0.0
                                                                                            InternalNamelpH3Mlb.exe
                                                                                            FileVersion1.0.0.0
                                                                                            CompanyName
                                                                                            LegalTrademarks
                                                                                            Comments
                                                                                            ProductNameBOCustomerPricing
                                                                                            ProductVersion1.0.0.0
                                                                                            FileDescriptionBOCustomerPricing
                                                                                            OriginalFilenamelpH3Mlb.exe

                                                                                            Network Behavior

                                                                                            No network behavior found

                                                                                            Code Manipulations

                                                                                            Statistics

                                                                                            Behavior

                                                                                            Click to jump to process

                                                                                            System Behavior

                                                                                            General

                                                                                            Start time:10:17:58
                                                                                            Start date:14/10/2021
                                                                                            Path:C:\Users\user\Desktop\PI.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Users\user\Desktop\PI.exe'
                                                                                            Imagebase:0x870000
                                                                                            File size:1017344 bytes
                                                                                            MD5 hash:59F7F57B8D6C0E55493EEC56977D7CB4
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:.Net C# or VB.NET
                                                                                            Reputation:low

                                                                                            General

                                                                                            Start time:10:18:20
                                                                                            Start date:14/10/2021
                                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gBrGmFSvkGtF' /XML 'C:\Users\user\AppData\Local\Temp\tmpE100.tmp'
                                                                                            Imagebase:0xd00000
                                                                                            File size:185856 bytes
                                                                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:10:18:20
                                                                                            Start date:14/10/2021
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7f20f0000
                                                                                            File size:625664 bytes
                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:10:18:20
                                                                                            Start date:14/10/2021
                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:{path}
                                                                                            Imagebase:0x3e0000
                                                                                            File size:45152 bytes
                                                                                            MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:10:18:21
                                                                                            Start date:14/10/2021
                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:{path}
                                                                                            Imagebase:0xc70000
                                                                                            File size:45152 bytes
                                                                                            MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:.Net C# or VB.NET
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000000.400992134.0000000002FE1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000000.401899331.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000E.00000000.401899331.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.429850923.0000000002FE1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.429850923.0000000002FE1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.428455338.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000E.00000002.428455338.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000000.399708702.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000E.00000000.399708702.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000000.403049754.0000000002FE1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000000.403049754.0000000002FE1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:10:18:47
                                                                                            Start date:14/10/2021
                                                                                            Path:C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe'
                                                                                            Imagebase:0x3c0000
                                                                                            File size:45152 bytes
                                                                                            MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:.Net C# or VB.NET
                                                                                            Antivirus matches:
                                                                                            • Detection: 0%, Virustotal, Browse
                                                                                            • Detection: 0%, Metadefender, Browse
                                                                                            • Detection: 0%, ReversingLabs
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:10:18:48
                                                                                            Start date:14/10/2021
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7f20f0000
                                                                                            File size:625664 bytes
                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:10:18:56
                                                                                            Start date:14/10/2021
                                                                                            Path:C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Users\user\AppData\Roaming\ZAYOk\ZAYOk.exe'
                                                                                            Imagebase:0xf00000
                                                                                            File size:45152 bytes
                                                                                            MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:.Net C# or VB.NET
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:10:18:56
                                                                                            Start date:14/10/2021
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7f20f0000
                                                                                            File size:625664 bytes
                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:10:19:00
                                                                                            Start date:14/10/2021
                                                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7100 -s 1476
                                                                                            Imagebase:0x3e0000
                                                                                            File size:434592 bytes
                                                                                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:.Net C# or VB.NET
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001B.00000003.414727052.00000000055F0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                            Reputation:high

                                                                                            Disassembly

                                                                                            Code Analysis

                                                                                            Reset < >