Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ki8WlC0ddA.exe

Overview

General Information

Sample Name:Ki8WlC0ddA.exe
Analysis ID:623786
MD5:0f8819270f261881bdfdbb15fe4f4d7c
SHA1:7473c2e2683725955a0e9ace00fa1dea2a884a4c
SHA256:42bc81c2809d6ae05c7eac0f21374e297f21acb00d3baee3a2c6a14b963a058a
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • Ki8WlC0ddA.exe (PID: 4340 cmdline: "C:\Users\user\Desktop\Ki8WlC0ddA.exe" MD5: 0F8819270F261881BDFDBB15FE4F4D7C)
    • powershell.exe (PID: 6620 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nbbxvA.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 2892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 2896 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nbbxvA" /XML "C:\Users\user\AppData\Local\Temp\tmp39F4.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5288 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Ki8WlC0ddA.exe (PID: 5072 cmdline: C:\Users\user\Desktop\Ki8WlC0ddA.exe MD5: 0F8819270F261881BDFDBB15FE4F4D7C)
    • Ki8WlC0ddA.exe (PID: 6192 cmdline: C:\Users\user\Desktop\Ki8WlC0ddA.exe MD5: 0F8819270F261881BDFDBB15FE4F4D7C)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "6d38b3f5-33a1-41b7-a7f2-d8fe2b39", "Group": "happy man", "Domain1": "91.193.75.221", "Domain2": "", "Port": 4040, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 30 entries
      SourceRuleDescriptionAuthorStrings
      12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xb184:$x1: NanoCore.ClientPluginHost
      • 0xb1b1:$x2: IClientNetworkHost
      12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xb184:$x2: NanoCore.ClientPluginHost
      • 0xc25f:$s4: PipeCreated
      • 0xb19e:$s5: IClientLoggingHost
      12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
        • 0xb14f:$x2: NanoCore.ClientPlugin
        • 0xb184:$x3: NanoCore.ClientPluginHost
        • 0xb143:$i2: IClientData
        • 0xb165:$i3: IClientNetwork
        • 0xb174:$i5: IClientDataHost
        • 0xb19e:$i6: IClientLoggingHost
        • 0xb1b1:$i7: IClientNetworkHost
        • 0xb1c4:$i8: IClientUIHost
        • 0xb1d2:$i9: IClientNameObjectCollection
        • 0xb1ee:$i10: IClientReadOnlyNameObjectCollection
        • 0xaf41:$s1: ClientPlugin
        • 0xb158:$s1: ClientPlugin
        • 0x10179:$s6: get_ClientSettings
        12.2.Ki8WlC0ddA.exe.53b0000.8.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xd9ad:$x1: NanoCore.ClientPluginHost
        • 0xd9da:$x2: IClientNetworkHost
        Click to see the 91 entries

        AV Detection

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Ki8WlC0ddA.exe, ProcessId: 6192, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Ki8WlC0ddA.exe, ProcessId: 6192, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Ki8WlC0ddA.exe, ProcessId: 6192, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Ki8WlC0ddA.exe, ProcessId: 6192, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6d38b3f5-33a1-41b7-a7f2-d8fe2b39", "Group": "happy man", "Domain1": "91.193.75.221", "Domain2": "", "Port": 4040, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Source: Ki8WlC0ddA.exeVirustotal: Detection: 63%Perma Link
        Source: Ki8WlC0ddA.exeReversingLabs: Detection: 57%
        Source: 91.193.75.221Avira URL Cloud: Label: malware
        Source: 91.193.75.221Virustotal: Detection: 7%Perma Link
        Source: C:\Users\user\AppData\Roaming\nbbxvA.exeReversingLabs: Detection: 57%
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTR
        Source: Ki8WlC0ddA.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\nbbxvA.exeJoe Sandbox ML: detected
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpackAvira: Label: TR/NanoCore.fadte
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: Ki8WlC0ddA.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: Ki8WlC0ddA.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking

        barindex
        Source: Malware configuration extractorURLs:
        Source: Malware configuration extractorURLs: 91.193.75.221
        Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
        Source: global trafficTCP traffic: 192.168.2.7:49773 -> 91.193.75.221:4040
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.w
        Source: Ki8WlC0ddA.exe, 00000000.00000003.364222229.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364443941.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363651716.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364147023.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364089454.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363616640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363685426.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363932125.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364045961.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364363138.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363844392.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
        Source: Ki8WlC0ddA.exe, 00000000.00000003.363490557.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363651716.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363616640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363685426.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363844392.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.comu
        Source: Ki8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: Ki8WlC0ddA.exe, 00000000.00000003.395751162.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.395884258.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.395670428.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agfamonotype.Y
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com-s
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com.t
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTC
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTCy
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comUI
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.2
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.v
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comorm
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.compor
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comue~
        Source: Ki8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com.TTFY
        Source: Ki8WlC0ddA.exe, 00000000.00000003.379402399.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: Ki8WlC0ddA.exe, 00000000.00000003.375811643.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378773035.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377613113.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377907580.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378618291.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378378752.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377755305.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377461785.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378216379.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377405776.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378116495.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377284810.00000000054E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersn
        Source: Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerso
        Source: Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376318651.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersw
        Source: Ki8WlC0ddA.exe, 00000000.00000003.375925606.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comC
        Source: Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379065859.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376229750.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
        Source: Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378684255.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378287930.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378450907.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comL.TTF
        Source: Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381204043.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsv
        Source: Ki8WlC0ddA.exe, 00000000.00000003.396815587.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396519860.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396425870.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.397001492.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396346589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438648214.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396600351.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comce2
        Source: Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378684255.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378287930.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378450907.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
        Source: Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdC
        Source: Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgrita
        Source: Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378684255.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376318651.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378287930.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378450907.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comicv
        Source: Ki8WlC0ddA.exe, 00000000.00000003.396815587.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396519860.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396425870.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.397001492.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396295063.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396346589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438648214.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396600351.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comiono(
        Source: Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comitudC
        Source: Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comlic3
        Source: Ki8WlC0ddA.exe, 00000000.00000003.396600351.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm
        Source: Ki8WlC0ddA.exe, 00000000.00000003.375925606.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.375811643.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.como
        Source: Ki8WlC0ddA.exe, 00000000.00000003.381734424.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382272498.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382092130.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381834849.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381349447.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382462785.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382572076.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381204043.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379065859.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comok
        Source: Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379402399.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comonyF(
        Source: Ki8WlC0ddA.exe, 00000000.00000003.375811643.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comtoF
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367326593.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367144392.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: Ki8WlC0ddA.exe, 00000000.00000003.366859147.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366705899.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/a
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnF
        Source: Ki8WlC0ddA.exe, 00000000.00000003.367326593.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367144392.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnM
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368395220.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnicr
        Source: Ki8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnl
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnn
        Source: Ki8WlC0ddA.exe, 00000000.00000003.382572076.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
        Source: Ki8WlC0ddA.exe, 00000000.00000003.382572076.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/.
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: Ki8WlC0ddA.exe, 00000000.00000003.382966537.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.393199530.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.393959605.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: Ki8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.krF
        Source: Ki8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.krm
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373438207.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373111641.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372973754.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373048058.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/(
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/3
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/:
        Source: Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/C
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Lodi
        Source: Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
        Source: Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/iv
        Source: Ki8WlC0ddA.exe, 00000000.00000003.373508650.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372776835.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373405020.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373230539.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373729462.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372572237.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372663553.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373563351.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373470016.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373668116.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373438207.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373111641.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372973754.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373048058.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/3
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/C
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/k-s
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/r
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372776835.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372572237.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372663553.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372973754.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373048058.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/t
        Source: Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376318651.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
        Source: Ki8WlC0ddA.exe, 00000000.00000003.361655494.00000000054B2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: Ki8WlC0ddA.exe, 00000000.00000003.361655494.00000000054B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comaK
        Source: Ki8WlC0ddA.exe, 00000000.00000003.361655494.00000000054B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comt;
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366501762.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: Ki8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krFo
        Source: Ki8WlC0ddA.exe, 00000000.00000003.366501762.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krc
        Source: Ki8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366501762.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krn-u
        Source: Ki8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krttp://w
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368320050.00000000009DC000.00000004.00000020.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn%
        Source: Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn-s
        Source: Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnG
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnUI
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTR

        System Summary

        barindex
        Source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.2.Ki8WlC0ddA.exe.5130000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.5130000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.25ed490.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.2.Ki8WlC0ddA.exe.29a7c98.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.29a7c98.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.25e6244.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.Ki8WlC0ddA.exe.25f96dc.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Ki8WlC0ddA.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.5130000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.5130000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.5130000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.25ed490.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.29a7c98.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.29a7c98.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.29a7c98.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.25e6244.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.25f96dc.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 0_2_0230E6F00_2_0230E6F0
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 0_2_0230C2A40_2_0230C2A4
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 0_2_0230E6E80_2_0230E6E8
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 12_2_00E7E48012_2_00E7E480
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 12_2_00E7E47112_2_00E7E471
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 12_2_00E7BBD412_2_00E7BBD4
        Source: Ki8WlC0ddA.exeBinary or memory string: OriginalFilename vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exe, 00000000.00000002.439624478.0000000006E00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exe, 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exeBinary or memory string: OriginalFilename vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exeBinary or memory string: OriginalFilename vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.635007701.0000000005E00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.626506471.0000000002971000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exeBinary or memory string: OriginalFilenameTYPEFL.exe> vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: nbbxvA.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: Ki8WlC0ddA.exeVirustotal: Detection: 63%
        Source: Ki8WlC0ddA.exeReversingLabs: Detection: 57%
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeFile read: C:\Users\user\Desktop\Ki8WlC0ddA.exeJump to behavior
        Source: Ki8WlC0ddA.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\Ki8WlC0ddA.exe "C:\Users\user\Desktop\Ki8WlC0ddA.exe"
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nbbxvA.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nbbxvA" /XML "C:\Users\user\AppData\Local\Temp\tmp39F4.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Users\user\Desktop\Ki8WlC0ddA.exe C:\Users\user\Desktop\Ki8WlC0ddA.exe
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Users\user\Desktop\Ki8WlC0ddA.exe C:\Users\user\Desktop\Ki8WlC0ddA.exe
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nbbxvA.exeJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nbbxvA" /XML "C:\Users\user\AppData\Local\Temp\tmp39F4.tmpJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Users\user\Desktop\Ki8WlC0ddA.exe C:\Users\user\Desktop\Ki8WlC0ddA.exeJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Users\user\Desktop\Ki8WlC0ddA.exe C:\Users\user\Desktop\Ki8WlC0ddA.exeJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeFile created: C:\Users\user\AppData\Roaming\nbbxvA.exeJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeFile created: C:\Users\user\AppData\Local\Temp\tmp39F4.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@11/9@0/1
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5288:120:WilError_01
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeMutant created: \Sessions\1\BaseNamedObjects\DnZEhaaQkSWDfaoNzJby
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2892:120:WilError_01
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{6d38b3f5-33a1-41b7-a7f2-d8fe2b391c1c}
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: Ki8WlC0ddA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: Ki8WlC0ddA.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Data Obfuscation

        barindex
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 0_2_0011A224 push es; ret 0_2_0011A232
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 0_2_0230F6F0 push eax; iretd 0_2_0230F9F1
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 9_2_0043A224 push es; ret 9_2_0043A232
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 12_2_005AA224 push es; ret 12_2_005AA232
        Source: initial sampleStatic PE information: section name: .text entropy: 7.94239606201
        Source: initial sampleStatic PE information: section name: .text entropy: 7.94239606201
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeFile created: C:\Users\user\AppData\Roaming\nbbxvA.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nbbxvA" /XML "C:\Users\user\AppData\Local\Temp\tmp39F4.tmp

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeFile opened: C:\Users\user\Desktop\Ki8WlC0ddA.exe:Zone.Identifier read attributes | deleteJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.25ed490.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.25e6244.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.25f96dc.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTR
        Source: Ki8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
        Source: Ki8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exe TID: 5000Thread sleep time: -45733s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exe TID: 5376Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2220Thread sleep time: -7378697629483816s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exe TID: 4940Thread sleep time: -23058430092136925s >= -30000sJump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7376Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1195Jump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeWindow / User API: threadDelayed 4795Jump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeWindow / User API: threadDelayed 4828Jump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeWindow / User API: foregroundWindowGot 801Jump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeThread delayed: delay time: 45733Jump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.625940839.0000000000D0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllAu4
        Source: Ki8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: Ki8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
        Source: Ki8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
        Source: Ki8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeMemory written: C:\Users\user\Desktop\Ki8WlC0ddA.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nbbxvA.exe
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nbbxvA.exeJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nbbxvA.exeJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nbbxvA" /XML "C:\Users\user\AppData\Local\Temp\tmp39F4.tmpJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Users\user\Desktop\Ki8WlC0ddA.exe C:\Users\user\Desktop\Ki8WlC0ddA.exeJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Users\user\Desktop\Ki8WlC0ddA.exe C:\Users\user\Desktop\Ki8WlC0ddA.exeJump to behavior
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.627077052.0000000002A59000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 0000000C.00000002.635105585.000000000632E000.00000004.00000010.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 0000000C.00000002.634784582.0000000005CFD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.626701160.00000000029ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerD$
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.635167640.000000000679E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerp
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.627077052.0000000002A59000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 0000000C.00000002.626701160.00000000029ED000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 0000000C.00000002.630015520.0000000002DCE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager|$
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.629494799.0000000002D5A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerDZ
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.632864994.0000000005ACB000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: lProgram Manager
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.627077052.0000000002A59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerHa
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.627077052.0000000002A59000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 0000000C.00000002.629277294.0000000002D23000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 0000000C.00000002.629494799.0000000002D5A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerph
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Users\user\Desktop\Ki8WlC0ddA.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Users\user\Desktop\Ki8WlC0ddA.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Ki8WlC0ddA.exe, 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Ki8WlC0ddA.exe, 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.626506471.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.626506471.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTR
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Scheduled Task/Job
        1
        Scheduled Task/Job
        112
        Process Injection
        1
        Masquerading
        11
        Input Capture
        1
        Query Registry
        Remote Services11
        Input Capture
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Scheduled Task/Job
        11
        Disable or Modify Tools
        LSASS Memory21
        Security Software Discovery
        Remote Desktop Protocol11
        Archive Collected Data
        Exfiltration Over Bluetooth1
        Non-Standard Port
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
        Virtualization/Sandbox Evasion
        Security Account Manager2
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Remote Access Software
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
        Process Injection
        NTDS21
        Virtualization/Sandbox Evasion
        Distributed Component Object ModelInput CaptureScheduled Transfer1
        Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Deobfuscate/Decode Files or Information
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common1
        Hidden Files and Directories
        Cached Domain Credentials1
        File and Directory Discovery
        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items2
        Obfuscated Files or Information
        DCSync12
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
        Software Packing
        Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Ki8WlC0ddA.exe63%VirustotalBrowse
        Ki8WlC0ddA.exe57%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        Ki8WlC0ddA.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\nbbxvA.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\nbbxvA.exe57%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        SourceDetectionScannerLabelLinkDownload
        12.2.Ki8WlC0ddA.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        12.2.Ki8WlC0ddA.exe.53b0000.8.unpack100%AviraTR/NanoCore.fadteDownload File
        12.0.Ki8WlC0ddA.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        12.0.Ki8WlC0ddA.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        12.0.Ki8WlC0ddA.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        12.0.Ki8WlC0ddA.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        12.0.Ki8WlC0ddA.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        No Antivirus matches
        SourceDetectionScannerLabelLink
        0%Avira URL Cloudsafe
        http://www.carterandcone.compor0%Avira URL Cloudsafe
        http://www.sandoll.co.krttp://w0%Avira URL Cloudsafe
        91.193.75.2218%VirustotalBrowse
        91.193.75.221100%Avira URL Cloudmalware
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/:0%URL Reputationsafe
        http://www.fontbureau.comgrita0%URL Reputationsafe
        http://www.carterandcone.comUI0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/30%URL Reputationsafe
        http://www.founder.com.cn/cn/a0%URL Reputationsafe
        http://www.fontbureau.comalsv0%Avira URL Cloudsafe
        http://www.sajatypeworks.comaK0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/(0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.goodfont.co.krm0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.fontbureau.comC0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cn-s0%Avira URL Cloudsafe
        http://www.fontbureau.comicv0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Lodi0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.fontbureau.comonyF(0%Avira URL Cloudsafe
        http://www.agfamonotype.Y0%Avira URL Cloudsafe
        http://www.fontbureau.com.TTFY0%Avira URL Cloudsafe
        http://www.carterandcone.com.t0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/C0%URL Reputationsafe
        http://www.sandoll.co.krc0%Avira URL Cloudsafe
        http://en.w0%URL Reputationsafe
        http://www.goodfont.co.krF0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.carterandcone.como.20%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/t0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/r0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/iv0%Avira URL Cloudsafe
        http://www.sajatypeworks.comt;0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnicr0%URL Reputationsafe
        http://www.carterandcone.com-s0%Avira URL Cloudsafe
        http://www.fontbureau.comok0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cnG0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/C0%URL Reputationsafe
        http://www.fontbureau.comitudC0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cnM0%URL Reputationsafe
        http://www.zhongyicts.com.cnUI0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/30%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.founder.com.cn/cnF0%URL Reputationsafe
        http://www.zhongyicts.com.cn%0%Avira URL Cloudsafe
        http://www.carterandcone.como.v0%Avira URL Cloudsafe
        http://www.fontbureau.comiono(0%Avira URL Cloudsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cnn0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.comu0%URL Reputationsafe
        http://www.founder.com.cn/cnl0%URL Reputationsafe
        http://www.sandoll.co.krFo0%Avira URL Cloudsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.fontbureau.comF0%URL Reputationsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.fontbureau.comL.TTF0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.fontbureau.comd0%URL Reputationsafe
        http://www.fontbureau.comce20%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/k-s0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.galapagosdesign.com/.0%Avira URL Cloudsafe
        http://www.carterandcone.comTCy0%Avira URL Cloudsafe
        http://www.carterandcone.comorm0%Avira URL Cloudsafe
        http://www.monotype.0%URL Reputationsafe
        http://www.carterandcone.comue~0%Avira URL Cloudsafe
        http://www.fontbureau.comm0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.fontbureau.como0%URL Reputationsafe
        http://www.fontbureau.comdC0%Avira URL Cloudsafe
        http://www.sandoll.co.krn-u0%URL Reputationsafe
        http://www.fontbureau.comlic30%Avira URL Cloudsafe
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        true
        • Avira URL Cloud: safe
        low
        91.193.75.221true
        • 8%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.carterandcone.comporKi8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.sandoll.co.krttp://wKi8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designersKi8WlC0ddA.exe, 00000000.00000003.379402399.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.sajatypeworks.comKi8WlC0ddA.exe, 00000000.00000003.361655494.00000000054B2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.founder.com.cn/cn/cTheKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.jiyu-kobo.co.jp/:Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comgritaKi8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.carterandcone.comUIKi8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.jiyu-kobo.co.jp/3Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.founder.com.cn/cn/aKi8WlC0ddA.exe, 00000000.00000003.366859147.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366705899.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comalsvKi8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381204043.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.sajatypeworks.comaKKi8WlC0ddA.exe, 00000000.00000003.361655494.00000000054B2000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.galapagosdesign.com/DPleaseKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.jiyu-kobo.co.jp/Y0Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.ascendercorp.com/typedesigners.htmlKi8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.jiyu-kobo.co.jp/(Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.urwpp.deDPleaseKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.goodfont.co.krmKi8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.zhongyicts.com.cnKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameKi8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comCKi8WlC0ddA.exe, 00000000.00000003.375925606.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.zhongyicts.com.cn-sKi8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.comicvKi8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378684255.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376318651.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378287930.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378450907.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/LodiKi8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.galapagosdesign.com/Ki8WlC0ddA.exe, 00000000.00000003.382572076.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.comonyF(Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379402399.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://www.agfamonotype.YKi8WlC0ddA.exe, 00000000.00000003.395751162.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.395884258.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.395670428.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com.TTFYKi8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.carterandcone.com.tKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/CKi8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.sandoll.co.krcKi8WlC0ddA.exe, 00000000.00000003.366501762.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://en.wKi8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.goodfont.co.krFKi8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.carterandcone.comlKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers/frere-jones.htmlKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378773035.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377613113.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377907580.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378618291.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378378752.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377755305.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377461785.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378216379.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377405776.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378116495.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377284810.00000000054E3000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.carterandcone.como.2Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.jiyu-kobo.co.jp/tKi8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372776835.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372572237.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372663553.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372973754.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373048058.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/rKi8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/ivKi8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.sajatypeworks.comt;Ki8WlC0ddA.exe, 00000000.00000003.361655494.00000000054B2000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.founder.com.cn/cnicrKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368395220.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.carterandcone.com-sKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.comokKi8WlC0ddA.exe, 00000000.00000003.381734424.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382272498.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382092130.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381834849.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381349447.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382462785.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382572076.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381204043.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379065859.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.zhongyicts.com.cnGKi8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designersGKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designers/?Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.jiyu-kobo.co.jp/jp/CKi8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.comitudCKi8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.founder.com.cn/cn/bTheKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cnMKi8WlC0ddA.exe, 00000000.00000003.367326593.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367144392.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.zhongyicts.com.cnUIKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.tiro.comKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368320050.00000000009DC000.00000004.00000020.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/jp/3Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.goodfont.co.krKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comKi8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnFKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.zhongyicts.com.cn%Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.carterandcone.como.vKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.comiono(Ki8WlC0ddA.exe, 00000000.00000003.396815587.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396519860.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396425870.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.397001492.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396295063.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396346589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438648214.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396600351.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.typography.netDKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnnKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmKi8WlC0ddA.exe, 00000000.00000003.382966537.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.393199530.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.393959605.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.comKi8WlC0ddA.exe, 00000000.00000003.364222229.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364443941.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363651716.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364147023.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364089454.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363616640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363685426.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363932125.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364045961.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364363138.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363844392.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.comuKi8WlC0ddA.exe, 00000000.00000003.363490557.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363651716.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363616640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363685426.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363844392.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnlKi8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sandoll.co.krFoKi8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designerswKi8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376318651.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fonts.comKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.sandoll.co.krKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366501762.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sakkal.comKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersoKi8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designersnKi8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.apache.org/licenses/LICENSE-2.0Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.comKi8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comFKi8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379065859.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376229750.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comTCKi8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comL.TTFKi8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378684255.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378287930.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378450907.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/Ki8WlC0ddA.exe, 00000000.00000003.373508650.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372776835.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373405020.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373230539.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373729462.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372572237.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372663553.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373563351.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373470016.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373668116.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373438207.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373111641.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372973754.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373048058.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comdKi8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378684255.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378287930.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378450907.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comce2Ki8WlC0ddA.exe, 00000000.00000003.396815587.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396519860.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396425870.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.397001492.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396346589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438648214.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396600351.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/k-sKi8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cnKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367326593.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367144392.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/.Ki8WlC0ddA.exe, 00000000.00000003.382572076.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.carterandcone.comTCyKi8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.carterandcone.comormKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.monotype.Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376318651.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comue~Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  http://www.fontbureau.commKi8WlC0ddA.exe, 00000000.00000003.396600351.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373438207.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373111641.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372973754.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373048058.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comoKi8WlC0ddA.exe, 00000000.00000003.375925606.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.375811643.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers8Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.comdCKi8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.sandoll.co.krn-uKi8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366501762.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comlic3Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.com/designers/Ki8WlC0ddA.exe, 00000000.00000003.375811643.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      91.193.75.221
                                      unknownSerbia
                                      209623DAVID_CRAIGGGtrue
                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                      Analysis ID:623786
                                      Start date and time: 10/05/202220:20:482022-05-10 20:20:48 +02:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 12m 19s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Sample file name:Ki8WlC0ddA.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:24
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@11/9@0/1
                                      EGA Information:
                                      • Successful, ratio: 66.7%
                                      HDC Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 29
                                      • Number of non-executed functions: 1
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                      • Execution Graph export aborted for target Ki8WlC0ddA.exe, PID 5072 because there are no executed function
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      20:22:22API Interceptor713x Sleep call for process: Ki8WlC0ddA.exe modified
                                      20:22:29API Interceptor41x Sleep call for process: powershell.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      91.193.75.221pp.exeGet hashmaliciousBrowse
                                        invoice.xlsxGet hashmaliciousBrowse
                                          Signed Charter Agreement_Apr_08th_2022.vbsGet hashmaliciousBrowse
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            DAVID_CRAIGGGxVDAUvl3Pn.exeGet hashmaliciousBrowse
                                            • 91.193.75.134
                                            e1f388b8a086e034b1fbd94ca7341008.exeGet hashmaliciousBrowse
                                            • 185.140.53.3
                                            CMACGM-WBINS9013246-20210714-125247.pdf.vbsGet hashmaliciousBrowse
                                            • 91.193.75.131
                                            po-iteam DOO00076543.exeGet hashmaliciousBrowse
                                            • 91.193.75.132
                                            Charter request details.vbsGet hashmaliciousBrowse
                                            • 91.193.75.194
                                            SWIFT_poruka ERSTE BANK ad NOVI SAD.vbsGet hashmaliciousBrowse
                                            • 91.193.75.133
                                            IMG2_455982134.exeGet hashmaliciousBrowse
                                            • 185.140.53.174
                                            Purchase Report.vbsGet hashmaliciousBrowse
                                            • 91.193.75.175
                                            BRINK GMBH BESTELLUNG _ ANFORDERUNG SH238429 12x2.5 mm#U00b2.exeGet hashmaliciousBrowse
                                            • 185.140.53.72
                                            Scan 1000276325462 document.vbsGet hashmaliciousBrowse
                                            • 91.193.75.131
                                            NEW ORDER 0522 202204280000883 pdf.vbsGet hashmaliciousBrowse
                                            • 91.193.75.132
                                            commercial invoice.vbsGet hashmaliciousBrowse
                                            • 185.165.153.84
                                            CHECK#718263.VBSGet hashmaliciousBrowse
                                            • 185.140.53.12
                                            eW8XdXzJ0K.exeGet hashmaliciousBrowse
                                            • 91.193.75.227
                                            HIkhD4L4gC.exeGet hashmaliciousBrowse
                                            • 185.140.53.212
                                            DHL Shipment Notice of Arrival AWB 8032697940.vbsGet hashmaliciousBrowse
                                            • 91.193.75.209
                                            Invoice.vbsGet hashmaliciousBrowse
                                            • 91.193.75.227
                                            Payment-Advice.vbsGet hashmaliciousBrowse
                                            • 91.193.75.189
                                            Invoice Order.vbsGet hashmaliciousBrowse
                                            • 91.193.75.203
                                            download.dat.exeGet hashmaliciousBrowse
                                            • 91.193.75.203
                                            No context
                                            No context
                                            Process:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:modified
                                            Size (bytes):1308
                                            Entropy (8bit):5.345811588615766
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                            MD5:2E016B886BDB8389D2DD0867BE55F87B
                                            SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                            SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                            SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):22188
                                            Entropy (8bit):5.598160129279729
                                            Encrypted:false
                                            SSDEEP:384:9tCDe0wtHZHCIiYS0nIjultIA47nv3g3hInAML+6fmAV7ROidGZQvnI+++g:J5HCI7TIClt7c667KepNG+g
                                            MD5:E415DB43B45288B4347C4C3A5CFD1DA2
                                            SHA1:3C015F553C4D8A12D6AF92C59E1AD0780277CEAC
                                            SHA-256:62414F327822AF8C2CF75394C9E38227D812D42902619E22A93A02B917937A6B
                                            SHA-512:85DE19317306C8FA24153CAD13F9A1DD538A4D95C34EE4B1479B5AA2DB9539C2632FAA29F316CD3FEBBB2C9904AA908AD1F755433B27F595104C4045C1996AEC
                                            Malicious:false
                                            Reputation:low
                                            Preview:@...e...........d.......K...D.<.9.....X...-..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:very short file (no magic)
                                            Category:dropped
                                            Size (bytes):1
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3:U:U
                                            MD5:C4CA4238A0B923820DCC509A6F75849B
                                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:1
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:very short file (no magic)
                                            Category:dropped
                                            Size (bytes):1
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3:U:U
                                            MD5:C4CA4238A0B923820DCC509A6F75849B
                                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                            Malicious:false
                                            Preview:1
                                            Process:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                            File Type:XML 1.0 document, ASCII text
                                            Category:dropped
                                            Size (bytes):1609
                                            Entropy (8bit):5.126414460395903
                                            Encrypted:false
                                            SSDEEP:24:2di4+S2qh/dp1Kd+y1modHUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtqxvn:cgeHMYrFdOFzOzN33ODOiDdKrsuT+v
                                            MD5:D817721B3222A81D668B278F4C7FB15E
                                            SHA1:D9E3B938D94E3C4168E5595893B86DF03D1D62BE
                                            SHA-256:0C94818867E19163C0A62116BB70A70D3265E0F43FD1FEEF41C98D38EF82AFB3
                                            SHA-512:36D16F4F18A2EFC43A0EA3C74D87AEDE9017F2977ADF223B417ABBF8695971396AC541933CB23252E714E90DF2727F2FA8A105FBF12406CA80D1247A71FD92CA
                                            Malicious:true
                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvai
                                            Process:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                            File Type:Non-ISO extended-ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):8
                                            Entropy (8bit):3.0
                                            Encrypted:false
                                            SSDEEP:3:VUt:V0
                                            MD5:923A7A6E01C3242596B4D950D6B20EFA
                                            SHA1:330D952A60F1ECE84AE8A4881E3EA1BA35DBAE3D
                                            SHA-256:9BDC8A1B234E8533091289DB12DFFA06A876EE6B7252DDD52D0AE593029A258A
                                            SHA-512:C1BD44A61BFD0690C8BA754BD9BED08B276A56FF304A994C0B22901AA3F0F9DB00F14852142EC56895E7C0BA2B1E7AE3A0B6E8DA7CC90914FDC82D13D7952CB6
                                            Malicious:true
                                            Preview:h.*..2.H
                                            Process:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):657920
                                            Entropy (8bit):7.935629638737511
                                            Encrypted:false
                                            SSDEEP:12288:tYV82L2IIafm7N8VVfcYKMrc/nQPnEuBTVFKNFgq/TDm7r3:mu2KafmIfcY3Y/qHBZ8zlmH
                                            MD5:0F8819270F261881BDFDBB15FE4F4D7C
                                            SHA1:7473C2E2683725955A0E9ACE00FA1DEA2A884A4C
                                            SHA-256:42BC81C2809D6AE05C7EAC0F21374E297F21ACB00D3BAEE3A2C6A14B963A058A
                                            SHA-512:473808E146741876941FD96557FB290E707D645636AB039FD873C21023EC97345474D4272D20CBA63AC2F22097B2734DB0EB8817C3430907861CF60040DFD984
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 57%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....xb..............0.............B.... ... ....@.. .......................`............@.....................................O.... .......................@....................................................... ............... ..H............text...H.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................$.......H.......d...$O..............hF..........................................^..}.....(.......(.....*.0..+.........,..{.......+....,...{....o........(.....*...s....}......(......r...po.....*....0............{.....+..*&...}....*..s....}.....(........}.....(.....*..s....}.....(.......r...p}.....(.....*.0..`.........{....s.....+:....7...%..;.o......{.........................sw...o.......o ...%......-..o!....*...{.....o"...(#...($...(%.....{.....o.....*.0..?...........7...o........7..
                                            Process:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):26
                                            Entropy (8bit):3.95006375643621
                                            Encrypted:false
                                            SSDEEP:3:ggPYV:rPYV
                                            MD5:187F488E27DB4AF347237FE461A079AD
                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                            Malicious:true
                                            Preview:[ZoneTransfer]....ZoneId=0
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):5813
                                            Entropy (8bit):5.3818582682762255
                                            Encrypted:false
                                            SSDEEP:96:BZA65NQqDo1Z9ZO65NQqDo1ZJEq8jZyx65NQqDo1ZkN5MMxZe:jT
                                            MD5:1DA29D1894E77B9BA3977D096D10811E
                                            SHA1:D0DD941D535DD09DF3E4278C416BFECA0B1A5AEA
                                            SHA-256:6E785EE9F4562FC8CF7C81AA9DEC1A10B2A45CE3F5F2B978792E185926E2C106
                                            SHA-512:06A35D253A194C207E4B2045EDB577E18040835EAEC5F7632896E011EEE2F374F85EC01A63FB00F8F05CB9E3E5E0DD89822CC982862646584D9D48036A1A7671
                                            Malicious:false
                                            Preview:.**********************..Windows PowerShell transcript start..Start time: 20220510202229..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 849224 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\nbbxvA.exe..Process ID: 6620..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220510202229..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\nbbxvA.exe..**********************..Windows PowerShell transcript start..Start time: 20220510202546..Username: computer\user..RunAs User: DESKTOP-
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.935629638737511
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            • DOS Executable Generic (2002/1) 0.01%
                                            File name:Ki8WlC0ddA.exe
                                            File size:657920
                                            MD5:0f8819270f261881bdfdbb15fe4f4d7c
                                            SHA1:7473c2e2683725955a0e9ace00fa1dea2a884a4c
                                            SHA256:42bc81c2809d6ae05c7eac0f21374e297f21acb00d3baee3a2c6a14b963a058a
                                            SHA512:473808e146741876941fd96557fb290e707d645636ab039fd873c21023ec97345474d4272d20cba63ac2f22097b2734db0eb8817c3430907861cf60040dfd984
                                            SSDEEP:12288:tYV82L2IIafm7N8VVfcYKMrc/nQPnEuBTVFKNFgq/TDm7r3:mu2KafmIfcY3Y/qHBZ8zlmH
                                            TLSH:74E42228AB784B63CB3953F2A251429403F73B6C7021FF595D9128EE29D3F421662F93
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....xb..............0.............B.... ... ....@.. .......................`............@................................
                                            Icon Hash:00828e8e8686b000
                                            Entrypoint:0x4a1e42
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                            Time Stamp:0x6278C699 [Mon May 9 07:45:29 2022 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:v4.0.30319
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xa1df00x4f.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xa20000x5bc.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xa40000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000x9fe480xa0000False0.938734436035data7.94239606201IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                            .rsrc0xa20000x5bc0x600False0.425130208333data4.12036037241IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xa40000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountry
                                            RT_VERSION0xa20900x32cdata
                                            RT_MANIFEST0xa23cc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            DescriptionData
                                            Translation0x0000 0x04b0
                                            LegalCopyrightCopyright 2017
                                            Assembly Version1.0.0.0
                                            InternalNameTYPEFL.exe
                                            FileVersion1.0.0.0
                                            CompanyName
                                            LegalTrademarks
                                            Comments
                                            ProductNameProjektOkienka
                                            ProductVersion1.0.0.0
                                            FileDescriptionProjektOkienka
                                            OriginalFilenameTYPEFL.exe
                                            TimestampSource PortDest PortSource IPDest IP
                                            May 10, 2022 20:22:42.503998041 CEST497734040192.168.2.791.193.75.221
                                            May 10, 2022 20:22:42.545831919 CEST40404977391.193.75.221192.168.2.7
                                            May 10, 2022 20:22:43.080039978 CEST497734040192.168.2.791.193.75.221
                                            May 10, 2022 20:22:43.122967005 CEST40404977391.193.75.221192.168.2.7
                                            May 10, 2022 20:22:43.673918009 CEST497734040192.168.2.791.193.75.221
                                            May 10, 2022 20:22:43.715069056 CEST40404977391.193.75.221192.168.2.7
                                            May 10, 2022 20:22:47.804563999 CEST497774040192.168.2.791.193.75.221
                                            May 10, 2022 20:22:47.845561028 CEST40404977791.193.75.221192.168.2.7
                                            May 10, 2022 20:22:48.439953089 CEST497774040192.168.2.791.193.75.221
                                            May 10, 2022 20:22:48.480900049 CEST40404977791.193.75.221192.168.2.7
                                            May 10, 2022 20:22:49.130536079 CEST497774040192.168.2.791.193.75.221
                                            May 10, 2022 20:22:49.171638966 CEST40404977791.193.75.221192.168.2.7
                                            May 10, 2022 20:22:53.175615072 CEST497824040192.168.2.791.193.75.221
                                            May 10, 2022 20:22:53.216734886 CEST40404978291.193.75.221192.168.2.7
                                            May 10, 2022 20:22:53.737314939 CEST497824040192.168.2.791.193.75.221
                                            May 10, 2022 20:22:53.778502941 CEST40404978291.193.75.221192.168.2.7
                                            May 10, 2022 20:22:54.440404892 CEST497824040192.168.2.791.193.75.221
                                            May 10, 2022 20:22:54.481309891 CEST40404978291.193.75.221192.168.2.7
                                            May 10, 2022 20:22:58.527121067 CEST497844040192.168.2.791.193.75.221
                                            May 10, 2022 20:22:58.568022013 CEST40404978491.193.75.221192.168.2.7
                                            May 10, 2022 20:22:59.128285885 CEST497844040192.168.2.791.193.75.221
                                            May 10, 2022 20:22:59.169106960 CEST40404978491.193.75.221192.168.2.7
                                            May 10, 2022 20:22:59.737725019 CEST497844040192.168.2.791.193.75.221
                                            May 10, 2022 20:22:59.778687000 CEST40404978491.193.75.221192.168.2.7
                                            May 10, 2022 20:23:03.798732042 CEST497914040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:03.840225935 CEST40404979191.193.75.221192.168.2.7
                                            May 10, 2022 20:23:04.441392899 CEST497914040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:04.482343912 CEST40404979191.193.75.221192.168.2.7
                                            May 10, 2022 20:23:05.128849983 CEST497914040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:05.169980049 CEST40404979191.193.75.221192.168.2.7
                                            May 10, 2022 20:23:09.196000099 CEST497934040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:09.240170956 CEST40404979391.193.75.221192.168.2.7
                                            May 10, 2022 20:23:09.941673994 CEST497934040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:09.985274076 CEST40404979391.193.75.221192.168.2.7
                                            May 10, 2022 20:23:10.629247904 CEST497934040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:10.670150995 CEST40404979391.193.75.221192.168.2.7
                                            May 10, 2022 20:23:15.073534012 CEST497964040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:15.115176916 CEST40404979691.193.75.221192.168.2.7
                                            May 10, 2022 20:23:15.645334959 CEST497964040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:15.686187029 CEST40404979691.193.75.221192.168.2.7
                                            May 10, 2022 20:23:16.239181042 CEST497964040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:16.280177116 CEST40404979691.193.75.221192.168.2.7
                                            May 10, 2022 20:23:20.570420027 CEST497974040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:20.611356974 CEST40404979791.193.75.221192.168.2.7
                                            May 10, 2022 20:23:21.302205086 CEST497974040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:21.343199968 CEST40404979791.193.75.221192.168.2.7
                                            May 10, 2022 20:23:21.895936966 CEST497974040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:21.936805964 CEST40404979791.193.75.221192.168.2.7
                                            May 10, 2022 20:23:25.944119930 CEST498014040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:25.985007048 CEST40404980191.193.75.221192.168.2.7
                                            May 10, 2022 20:23:26.505623102 CEST498014040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:26.546449900 CEST40404980191.193.75.221192.168.2.7
                                            May 10, 2022 20:23:27.208856106 CEST498014040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:27.249741077 CEST40404980191.193.75.221192.168.2.7
                                            May 10, 2022 20:23:31.266387939 CEST498044040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:31.307337999 CEST40404980491.193.75.221192.168.2.7
                                            May 10, 2022 20:23:31.972084045 CEST498044040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:32.012989998 CEST40404980491.193.75.221192.168.2.7
                                            May 10, 2022 20:23:32.709341049 CEST498044040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:32.750113964 CEST40404980491.193.75.221192.168.2.7
                                            May 10, 2022 20:23:36.799782991 CEST498104040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:36.840713978 CEST40404981091.193.75.221192.168.2.7
                                            May 10, 2022 20:23:37.346612930 CEST498104040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:37.387509108 CEST40404981091.193.75.221192.168.2.7
                                            May 10, 2022 20:23:38.036809921 CEST498104040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:38.077678919 CEST40404981091.193.75.221192.168.2.7
                                            May 10, 2022 20:23:42.136236906 CEST498384040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:42.177123070 CEST40404983891.193.75.221192.168.2.7
                                            May 10, 2022 20:23:42.687381029 CEST498384040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:42.728276968 CEST40404983891.193.75.221192.168.2.7
                                            May 10, 2022 20:23:43.235841990 CEST498384040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:43.278156996 CEST40404983891.193.75.221192.168.2.7
                                            May 10, 2022 20:23:47.293898106 CEST498584040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:47.334815025 CEST40404985891.193.75.221192.168.2.7
                                            May 10, 2022 20:23:47.852050066 CEST498584040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:47.892920017 CEST40404985891.193.75.221192.168.2.7
                                            May 10, 2022 20:23:48.398979902 CEST498584040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:48.439848900 CEST40404985891.193.75.221192.168.2.7
                                            May 10, 2022 20:23:52.450114012 CEST498644040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:52.493285894 CEST40404986491.193.75.221192.168.2.7
                                            May 10, 2022 20:23:53.149414062 CEST498644040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:53.190282106 CEST40404986491.193.75.221192.168.2.7
                                            May 10, 2022 20:23:53.836975098 CEST498644040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:53.878005981 CEST40404986491.193.75.221192.168.2.7
                                            May 10, 2022 20:23:58.045922041 CEST498654040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:58.086949110 CEST40404986591.193.75.221192.168.2.7
                                            May 10, 2022 20:23:58.587449074 CEST498654040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:58.628504992 CEST40404986591.193.75.221192.168.2.7
                                            May 10, 2022 20:23:59.134346008 CEST498654040192.168.2.791.193.75.221
                                            May 10, 2022 20:23:59.175266027 CEST40404986591.193.75.221192.168.2.7
                                            May 10, 2022 20:24:03.182952881 CEST498664040192.168.2.791.193.75.221
                                            May 10, 2022 20:24:03.223838091 CEST40404986691.193.75.221192.168.2.7
                                            May 10, 2022 20:24:03.729336977 CEST498664040192.168.2.791.193.75.221
                                            May 10, 2022 20:24:03.770442009 CEST40404986691.193.75.221192.168.2.7
                                            May 10, 2022 20:24:04.275322914 CEST498664040192.168.2.791.193.75.221
                                            May 10, 2022 20:24:04.316310883 CEST40404986691.193.75.221192.168.2.7
                                            May 10, 2022 20:24:08.323231936 CEST498674040192.168.2.791.193.75.221
                                            May 10, 2022 20:24:08.364171982 CEST40404986791.193.75.221192.168.2.7
                                            May 10, 2022 20:24:08.869493008 CEST498674040192.168.2.791.193.75.221
                                            May 10, 2022 20:24:08.910485029 CEST40404986791.193.75.221192.168.2.7
                                            May 10, 2022 20:24:09.416405916 CEST498674040192.168.2.791.193.75.221
                                            May 10, 2022 20:24:09.457261086 CEST40404986791.193.75.221192.168.2.7
                                            May 10, 2022 20:24:13.479927063 CEST498804040192.168.2.791.193.75.221
                                            May 10, 2022 20:24:13.520926952 CEST40404988091.193.75.221192.168.2.7
                                            May 10, 2022 20:24:14.026209116 CEST498804040192.168.2.791.193.75.221
                                            May 10, 2022 20:24:14.067075968 CEST40404988091.193.75.221192.168.2.7
                                            May 10, 2022 20:24:14.573189974 CEST498804040192.168.2.791.193.75.221
                                            May 10, 2022 20:24:14.613964081 CEST40404988091.193.75.221192.168.2.7

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:20:22:01
                                            Start date:10/05/2022
                                            Path:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\Ki8WlC0ddA.exe"
                                            Imagebase:0x110000
                                            File size:657920 bytes
                                            MD5 hash:0F8819270F261881BDFDBB15FE4F4D7C
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                            Reputation:low

                                            Target ID:4
                                            Start time:20:22:26
                                            Start date:10/05/2022
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nbbxvA.exe
                                            Imagebase:0xf0000
                                            File size:430592 bytes
                                            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Reputation:high

                                            Target ID:5
                                            Start time:20:22:26
                                            Start date:10/05/2022
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7bab80000
                                            File size:625664 bytes
                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:6
                                            Start time:20:22:26
                                            Start date:10/05/2022
                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nbbxvA" /XML "C:\Users\user\AppData\Local\Temp\tmp39F4.tmp
                                            Imagebase:0xcf0000
                                            File size:185856 bytes
                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:7
                                            Start time:20:22:28
                                            Start date:10/05/2022
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7bab80000
                                            File size:625664 bytes
                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:9
                                            Start time:20:22:30
                                            Start date:10/05/2022
                                            Path:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                            Imagebase:0x430000
                                            File size:657920 bytes
                                            MD5 hash:0F8819270F261881BDFDBB15FE4F4D7C
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low

                                            Target ID:12
                                            Start time:20:22:32
                                            Start date:10/05/2022
                                            Path:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                            Imagebase:0x5a0000
                                            File size:657920 bytes
                                            MD5 hash:0F8819270F261881BDFDBB15FE4F4D7C
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                            Reputation:low

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:12%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:97
                                              Total number of Limit Nodes:6
                                              execution_graph 10551 230b810 10552 230b876 10551->10552 10555 230b9d0 10552->10555 10558 2309980 10555->10558 10559 230ba38 DuplicateHandle 10558->10559 10560 230b925 10559->10560 10561 2309310 10565 23093f7 10561->10565 10569 2309408 10561->10569 10562 230931f 10566 230941b 10565->10566 10567 230942b 10566->10567 10573 2309a98 10566->10573 10567->10562 10570 230941b 10569->10570 10571 230942b 10570->10571 10572 2309a98 LoadLibraryExW 10570->10572 10571->10562 10572->10571 10574 2309aac 10573->10574 10576 2309ad1 10574->10576 10577 23095f8 10574->10577 10576->10567 10578 2309c78 LoadLibraryExW 10577->10578 10580 2309cf1 10578->10580 10580->10576 10581 23099f0 10582 2309a32 10581->10582 10583 2309a38 GetModuleHandleW 10581->10583 10582->10583 10584 2309a65 10583->10584 10585 23040d0 10586 23040e2 10585->10586 10587 23040ee 10586->10587 10591 23041e0 10586->10591 10596 2303c64 10587->10596 10589 230410d 10592 2304205 10591->10592 10600 23042e0 10592->10600 10604 23042d0 10592->10604 10597 2303c6f 10596->10597 10612 23051a4 10597->10612 10599 2306a31 10599->10589 10601 2304307 10600->10601 10603 23043e4 10601->10603 10608 2303de8 10601->10608 10606 2304307 10604->10606 10605 23043e4 10605->10605 10606->10605 10607 2303de8 CreateActCtxA 10606->10607 10607->10605 10609 2305370 CreateActCtxA 10608->10609 10611 2305433 10609->10611 10613 23051af 10612->10613 10616 23057f8 10613->10616 10615 2306c2d 10615->10599 10617 2305803 10616->10617 10620 2305828 10617->10620 10619 2306d02 10619->10615 10621 2305833 10620->10621 10624 2305858 10621->10624 10623 2306e02 10623->10619 10626 2305863 10624->10626 10625 230755c 10625->10623 10626->10625 10629 230b440 10626->10629 10635 230b431 10626->10635 10631 230b461 10629->10631 10630 230b485 10630->10625 10631->10630 10641 230b751 10631->10641 10646 230b6e8 10631->10646 10650 230b6f8 10631->10650 10636 230b461 10635->10636 10637 230b485 10636->10637 10638 230b751 LoadLibraryExW 10636->10638 10639 230b6f8 LoadLibraryExW 10636->10639 10640 230b6e8 LoadLibraryExW 10636->10640 10637->10625 10638->10637 10639->10637 10640->10637 10642 230b6fb 10641->10642 10643 230b75a 10641->10643 10644 230b73f 10642->10644 10654 23098f8 10642->10654 10643->10630 10644->10630 10647 230b6fb 10646->10647 10648 230b73f 10647->10648 10649 23098f8 LoadLibraryExW 10647->10649 10648->10630 10649->10648 10651 230b6fb 10650->10651 10652 23098f8 LoadLibraryExW 10651->10652 10653 230b73f 10651->10653 10652->10653 10653->10630 10655 2309903 10654->10655 10656 230c438 10655->10656 10658 23099c0 10655->10658 10659 23099cb 10658->10659 10660 2305858 LoadLibraryExW 10659->10660 10661 230c4a7 10659->10661 10660->10661 10665 230e228 10661->10665 10671 230e218 10661->10671 10662 230c4e0 10662->10656 10667 230e2a5 10665->10667 10668 230e259 10665->10668 10666 230e265 10666->10662 10667->10662 10668->10666 10669 230e6a8 LoadLibraryExW 10668->10669 10670 230e698 LoadLibraryExW 10668->10670 10669->10667 10670->10667 10672 230e2a5 10671->10672 10674 230e259 10671->10674 10672->10662 10673 230e265 10673->10662 10674->10673 10675 230e6a8 LoadLibraryExW 10674->10675 10676 230e698 LoadLibraryExW 10674->10676 10675->10672 10676->10672
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434793753.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2300000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7c39770276c660d5cdfaf928f0d7f138849835e749d16b7a3ba7a42ed4ee3e86
                                              • Instruction ID: cc1bf7fe142f6f0765a93fdb78af5e64a291dca10dc62e7dca8e716510cf8792
                                              • Opcode Fuzzy Hash: 7c39770276c660d5cdfaf928f0d7f138849835e749d16b7a3ba7a42ed4ee3e86
                                              • Instruction Fuzzy Hash: 9212FEF1C917668BE718CF65E4881A93B71B744328FD04A08E1E11FAD2D7B8996ECF44
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434793753.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2300000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 919fa485c5ae0d0f02a4191990812af94babb5994089baffcdd268bf83f61c51
                                              • Instruction ID: 8d362f27af0f40222abeaade3abad5600e0abed1659e084d7e2bd28a440ab6a5
                                              • Opcode Fuzzy Hash: 919fa485c5ae0d0f02a4191990812af94babb5994089baffcdd268bf83f61c51
                                              • Instruction Fuzzy Hash: 65C140F1C917658BD718CF65E4881A93BB1BB94328FD04B08E1A12F6D2D7B4986ECF44
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 262 2303de8-2305431 CreateActCtxA 265 2305433-2305439 262->265 266 230543a-2305494 262->266 265->266 273 23054a3-23054a7 266->273 274 2305496-2305499 266->274 275 23054b8 273->275 276 23054a9-23054b5 273->276 274->273 278 23054b9 275->278 276->275 278->278
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 02305421
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434793753.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2300000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: f2d27aec85a0e4ea98a212389a685f3fdc4a846bd889f24a509f86de512ed78b
                                              • Instruction ID: cae4dc0a404949b3055265bca950063097c83bce6fc5f808cd731bd76e6eb562
                                              • Opcode Fuzzy Hash: f2d27aec85a0e4ea98a212389a685f3fdc4a846bd889f24a509f86de512ed78b
                                              • Instruction Fuzzy Hash: A941E0B0D04618CFDB24CFA9C884BDEBBB5BF88308F50806AD508BB251DB756945CF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 279 230536e-2305431 CreateActCtxA 281 2305433-2305439 279->281 282 230543a-2305494 279->282 281->282 289 23054a3-23054a7 282->289 290 2305496-2305499 282->290 291 23054b8 289->291 292 23054a9-23054b5 289->292 290->289 294 23054b9 291->294 292->291 294->294
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 02305421
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434793753.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2300000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 60ce98d95bd1d8d8e72fe12584e43d97906db8a5f0876931e76c35f0e5c1ad6d
                                              • Instruction ID: d2d8e039f3fc28a7e4736c7c55b9dbd59856bd6f433d1fdf947c44010304c642
                                              • Opcode Fuzzy Hash: 60ce98d95bd1d8d8e72fe12584e43d97906db8a5f0876931e76c35f0e5c1ad6d
                                              • Instruction Fuzzy Hash: 6241D1B1D04218CFDB24CFA9C884BCDBBB5BF88308F64846AD408BB251DB756946CF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 395 230ba30-230bacc DuplicateHandle 396 230bad5-230baf2 395->396 397 230bace-230bad4 395->397 397->396
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0230B9FE,?,?,?,?,?), ref: 0230BABF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434793753.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2300000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: f84e0b03c6f990b49f4f380cd87a6b317a7bf5a244031c79574bbc4f6b1757a6
                                              • Instruction ID: 95dc4c077b97f4afaf7cfe67c0a8c71ab6cee6ef277d0b7ee1a7f7a017b8514d
                                              • Opcode Fuzzy Hash: f84e0b03c6f990b49f4f380cd87a6b317a7bf5a244031c79574bbc4f6b1757a6
                                              • Instruction Fuzzy Hash: 1421E5B59002099FDB10CFA9D584ADEFFF5EB48324F14841AE918A7350D378A955CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 389 2309980-230bacc DuplicateHandle 391 230bad5-230baf2 389->391 392 230bace-230bad4 389->392 392->391
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0230B9FE,?,?,?,?,?), ref: 0230BABF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434793753.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2300000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 23c50c1c7fcc4fe238a95c8f592ed519df84b501a012e93cd21a6be9cbf747f9
                                              • Instruction ID: c756e001264b5e05dfdc3d4829a7b6404a48fc0c1e9f05e38066ca268b24fa0a
                                              • Opcode Fuzzy Hash: 23c50c1c7fcc4fe238a95c8f592ed519df84b501a012e93cd21a6be9cbf747f9
                                              • Instruction Fuzzy Hash: 6A2116B5D04208AFDB10CF9AD584ADEFBF9EB48324F14841AE914B3350D374A954CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 400 23095f8-2309cb8 402 2309cc0-2309cef LoadLibraryExW 400->402 403 2309cba-2309cbd 400->403 404 2309cf1-2309cf7 402->404 405 2309cf8-2309d15 402->405 403->402 404->405
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02309AD1,00000800,00000000,00000000), ref: 02309CE2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434793753.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2300000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 734a023f6810cd9f0b00ecd8a8f1b82d693e6325c4e03e4640d177d6ecc80e8d
                                              • Instruction ID: 24806a3a4125f312a8897b52fddf5630008420b5d75c45ada198500551103b46
                                              • Opcode Fuzzy Hash: 734a023f6810cd9f0b00ecd8a8f1b82d693e6325c4e03e4640d177d6ecc80e8d
                                              • Instruction Fuzzy Hash: 781103B6D04209DFDB10CF9AC588BDEFBF4AB88724F00842EE915A7241C774A545CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 408 23099f0-2309a30 409 2309a32-2309a35 408->409 410 2309a38-2309a63 GetModuleHandleW 408->410 409->410 411 2309a65-2309a6b 410->411 412 2309a6c-2309a80 410->412 411->412
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02309A56
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434793753.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2300000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: cfa60f6c29645937202a0b1f4d092447af95834f7e0d9aeb40bbf7355fbebb36
                                              • Instruction ID: ab48258d1b9602473160f460cd613d994742eefa97f03567c5c61520a74cb98e
                                              • Opcode Fuzzy Hash: cfa60f6c29645937202a0b1f4d092447af95834f7e0d9aeb40bbf7355fbebb36
                                              • Instruction Fuzzy Hash: 931110B5D002498FCB10CF9AC484BDEFBF8AB88224F10841AD869B7201C378A545CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434619482.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_97d000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b4ccb00b55501ff49f453e1c8d8307eeaa6ab47b7e7a0f0c8f45ee5657614699
                                              • Instruction ID: 8799361b9caa491d9a994ea138265435c4f731d18e05fabec147693cf41e7b97
                                              • Opcode Fuzzy Hash: b4ccb00b55501ff49f453e1c8d8307eeaa6ab47b7e7a0f0c8f45ee5657614699
                                              • Instruction Fuzzy Hash: B92125B2504244DFDB05DF10D9C0B26BF75FF88328F24C969E9095B25AC33AD846DBA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434645605.000000000098D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0098D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_98d000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8e10d55a1935f03ebbae1e19b6ff958b3b00debd34309c3303a7d6919540209c
                                              • Instruction ID: 7aef858196593cf33aa285996683791095022d27afa3fdeb77c31c850aa24da8
                                              • Opcode Fuzzy Hash: 8e10d55a1935f03ebbae1e19b6ff958b3b00debd34309c3303a7d6919540209c
                                              • Instruction Fuzzy Hash: 1021F5B1508244DFDB14EF10D9C0B26BB65FB84318F24C96DE9494B386C73BD846CB61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434645605.000000000098D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0098D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_98d000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 53fa819e036ad3b68bb26456a873e3ebe5f26805435e2a8fec933c62cea36b86
                                              • Instruction ID: c1cd106a8bc86157db374e5179c5b93c5b5240bda728e0f267a4c5f78a29ef06
                                              • Opcode Fuzzy Hash: 53fa819e036ad3b68bb26456a873e3ebe5f26805435e2a8fec933c62cea36b86
                                              • Instruction Fuzzy Hash: E321D4B1508244EFDB05EF54D9C0F26BBA5FB84318F24CA6DE9494B386C73AD846CB61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434645605.000000000098D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0098D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_98d000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6edf0e4c32e76be04a90a59df6a8bd5e811b54c3346422d93e7f9890417c7c9c
                                              • Instruction ID: 99073be27b07905d77f1b423778b6dd30995a6026bfa0f37c19e7e851f15cd2a
                                              • Opcode Fuzzy Hash: 6edf0e4c32e76be04a90a59df6a8bd5e811b54c3346422d93e7f9890417c7c9c
                                              • Instruction Fuzzy Hash: 342192755093C48FCB02CF20D990715BF71EB46314F29C5DAD8498B697C33AD80ACB62
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434619482.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_97d000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0e6dc6bea322ac229bb9891d9adb3e808fc29097d9a63836f4574df099d61674
                                              • Instruction ID: ce46e761e95d0f4f47a7997035c26e25d67b9e59a38713a8ebc17cf14ec5aeae
                                              • Opcode Fuzzy Hash: 0e6dc6bea322ac229bb9891d9adb3e808fc29097d9a63836f4574df099d61674
                                              • Instruction Fuzzy Hash: 8611D376504284DFCB11CF10D5C4B16BF71FF84328F24C6A9E8490B65AC33AD95ACBA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434645605.000000000098D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0098D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_98d000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7cac04d20d57e68ec8c54170f596d09b5c829b2fe472d02dbf1630bf68f133f8
                                              • Instruction ID: 966244a3a781bb68c4bf8b701c71851c651f36ae1b38119614263a8d6c765610
                                              • Opcode Fuzzy Hash: 7cac04d20d57e68ec8c54170f596d09b5c829b2fe472d02dbf1630bf68f133f8
                                              • Instruction Fuzzy Hash: 2F118875904284DFDB12DF14D5C4B15BBB1FB84328F28C6AED8494B796C33AD84ACB62
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434619482.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_97d000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f2cc156aa45b215f11a7f30a9567ab054b987d3e250c8cd231c45259638d39ef
                                              • Instruction ID: 59c13f224e1959d8a173734de19c610499840270145730d297ae1417c00b39b7
                                              • Opcode Fuzzy Hash: f2cc156aa45b215f11a7f30a9567ab054b987d3e250c8cd231c45259638d39ef
                                              • Instruction Fuzzy Hash: 3001F7B240D3809AE7144E15CD84B66FBECEF41378F18C91AEE0C5A246D7799844C6B1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434619482.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_97d000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 77b0d999b2b9c168282794d1a124294b11b52da185d83b49d425b3cde61d6f60
                                              • Instruction ID: 77014a00fc268a4e18e3c39832c17dc43f18f72bed6ccf76cefe6147159ca964
                                              • Opcode Fuzzy Hash: 77b0d999b2b9c168282794d1a124294b11b52da185d83b49d425b3cde61d6f60
                                              • Instruction Fuzzy Hash: 8EF062B64092849EE7148E16CD88B66FBACEF81734F18C45AED085B286D7799C44CBB1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.434793753.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2300000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 30d321c87ef98083c95464713b36c33eaef809aeba830047c69cb214bb3cb6d4
                                              • Instruction ID: 055fb39e82d5adf5d54cbf90cd210cba31257c68bd4bb3d661c7ee5af17baaaf
                                              • Opcode Fuzzy Hash: 30d321c87ef98083c95464713b36c33eaef809aeba830047c69cb214bb3cb6d4
                                              • Instruction Fuzzy Hash: B9A19F32E102198FCF15CFA5C89459EBBF2FF85304B1585AAE805AB2A1DB35E945CF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Execution Graph

                                              Execution Coverage:9.3%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:87
                                              Total number of Limit Nodes:8
                                              execution_graph 16487 e7bd00 DuplicateHandle 16488 e7bd96 16487->16488 16489 e792f0 16490 e792ff 16489->16490 16493 e793d9 16489->16493 16502 e793e8 16489->16502 16494 e793dc 16493->16494 16510 e78704 16494->16510 16497 e79413 16497->16490 16498 e7940b 16498->16497 16499 e79610 GetModuleHandleW 16498->16499 16500 e7963d 16499->16500 16500->16490 16503 e78704 GetModuleHandleW 16502->16503 16504 e793fb 16503->16504 16505 e79413 16504->16505 16509 e79660 GetModuleHandleW 16504->16509 16505->16490 16506 e7940b 16506->16505 16507 e79610 GetModuleHandleW 16506->16507 16508 e7963d 16507->16508 16508->16490 16509->16506 16512 e795c8 GetModuleHandleW 16510->16512 16513 e793fb 16512->16513 16513->16497 16514 e79660 16513->16514 16515 e79664 16514->16515 16516 e78704 GetModuleHandleW 16515->16516 16517 e79684 16516->16517 16517->16498 16518 e7b6d0 GetCurrentProcess 16519 e7b74a GetCurrentThread 16518->16519 16523 e7b743 16518->16523 16520 e7b787 GetCurrentProcess 16519->16520 16521 e7b780 16519->16521 16522 e7b7bd 16520->16522 16521->16520 16524 e7b7e5 GetCurrentThreadId 16522->16524 16523->16519 16525 e7b816 16524->16525 16526 e79850 16527 e79892 16526->16527 16528 e79898 LoadLibraryExW 16526->16528 16527->16528 16529 e798c9 16528->16529 16530 e76758 16532 e76766 16530->16532 16533 e76344 16530->16533 16534 e7634f 16533->16534 16537 e76394 16534->16537 16536 e7688d 16536->16532 16538 e7639f 16537->16538 16541 e763c4 16538->16541 16540 e76962 16540->16536 16542 e763cf 16541->16542 16545 e763f4 16542->16545 16544 e76a62 16544->16540 16547 e763ff 16545->16547 16546 e771bc 16546->16544 16547->16546 16549 e7b40d 16547->16549 16550 e7b429 16549->16550 16551 e7b44d 16550->16551 16554 e7b5a9 16550->16554 16558 e7b5b8 16550->16558 16551->16546 16555 e7b5b4 16554->16555 16556 e7b5ff 16555->16556 16562 e7a0ec 16555->16562 16556->16551 16560 e7b5c5 16558->16560 16559 e7b5ff 16559->16551 16560->16559 16561 e7a0ec 6 API calls 16560->16561 16561->16559 16563 e7a0f7 16562->16563 16565 e7c2f8 16563->16565 16566 e7b904 16563->16566 16565->16565 16567 e7b90f 16566->16567 16568 e7c367 16567->16568 16569 e763f4 6 API calls 16567->16569 16576 e7c3d3 16568->16576 16582 e7c3e0 16568->16582 16569->16568 16570 e7c375 16574 e7e0f0 GetModuleHandleW GetModuleHandleW CreateWindowExW 16570->16574 16575 e7e0d8 GetModuleHandleW GetModuleHandleW CreateWindowExW 16570->16575 16571 e7c3a0 16571->16565 16574->16571 16575->16571 16577 e7c3dc 16576->16577 16579 e7c4df 16577->16579 16580 e7c437 16577->16580 16588 e7b9a0 16577->16588 16580->16579 16581 e7c4da KiUserCallbackDispatcher 16580->16581 16581->16579 16583 e7c40e 16582->16583 16584 e7b9a0 GetFocus 16583->16584 16585 e7c437 16583->16585 16587 e7c4df 16583->16587 16584->16585 16586 e7c4da KiUserCallbackDispatcher 16585->16586 16585->16587 16586->16587 16589 e7b9ab 16588->16589 16590 e7ba14 GetFocus 16589->16590 16591 e7c9f5 16589->16591 16590->16591 16591->16580

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 00E7B730
                                              • GetCurrentThread.KERNEL32 ref: 00E7B76D
                                              • GetCurrentProcess.KERNEL32 ref: 00E7B7AA
                                              • GetCurrentThreadId.KERNEL32 ref: 00E7B803
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.626129148.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e70000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 2215921fa33073c58b5c455d6cf06b860d713ae52f788e6b386667d394e83f22
                                              • Instruction ID: bc3cba439bd5ab3e3a27cee561568b359aa7dcd441e74c1a490279c0a1487b0d
                                              • Opcode Fuzzy Hash: 2215921fa33073c58b5c455d6cf06b860d713ae52f788e6b386667d394e83f22
                                              • Instruction Fuzzy Hash: 505168B09043488FDB14CFA9C548BAEBBF1AF89314F14C46AE049B7261C7746989CF66
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 00E7B730
                                              • GetCurrentThread.KERNEL32 ref: 00E7B76D
                                              • GetCurrentProcess.KERNEL32 ref: 00E7B7AA
                                              • GetCurrentThreadId.KERNEL32 ref: 00E7B803
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.626129148.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e70000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 2e25cba2b6bb12df429f5209237b23fdeb57fdc4f54acf4652a4bba353df40f2
                                              • Instruction ID: e1048138e106974c2a9fbc500ceab0a43f6b4ca671dfd0e89017b0d5f75fd603
                                              • Opcode Fuzzy Hash: 2e25cba2b6bb12df429f5209237b23fdeb57fdc4f54acf4652a4bba353df40f2
                                              • Instruction Fuzzy Hash: 0F5158B09043488FDB14CFA9D548B9EBBF1AF89314F24C559E419B7350C7746988CF66
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 86 e793e8-e793fd call e78704 89 e79413-e79417 86->89 90 e793ff-e7940d call e79660 86->90 91 e7942b-e7946c 89->91 92 e79419-e79423 89->92 90->89 94 e79548-e79608 90->94 97 e7946e-e79476 91->97 98 e79479-e79487 91->98 92->91 134 e79610-e7963b GetModuleHandleW 94->134 135 e7960a-e7960d 94->135 97->98 99 e794ab-e794ad 98->99 100 e79489-e7948e 98->100 104 e794b0-e794b7 99->104 102 e79490-e79497 call e78710 100->102 103 e79499 100->103 106 e7949b-e794a9 102->106 103->106 107 e794c4-e794cb 104->107 108 e794b9-e794c1 104->108 106->104 111 e794cd-e794d5 107->111 112 e794d8-e794e1 call e78720 107->112 108->107 111->112 117 e794e3-e794eb 112->117 118 e794ee-e794f3 112->118 117->118 119 e794f5-e794fc 118->119 120 e79511-e79515 118->120 119->120 121 e794fe-e7950e call e78730 call e78740 119->121 140 e79518 call e79968 120->140 141 e79518 call e79958 120->141 121->120 124 e7951b-e7951e 127 e79541-e79547 124->127 128 e79520-e7953e 124->128 128->127 136 e79644-e79658 134->136 137 e7963d-e79643 134->137 135->134 137->136 140->124 141->124
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.626129148.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e70000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: e60ca3538796651f920844d5dd14145d7f27aecea26a65f0f16046bfe14a858e
                                              • Instruction ID: e8b5dd65493cc6d1a54c5bd7c4fe0c5894f9e6633e485e88ac11be3b0cf1abc2
                                              • Opcode Fuzzy Hash: e60ca3538796651f920844d5dd14145d7f27aecea26a65f0f16046bfe14a858e
                                              • Instruction Fuzzy Hash: B9712570A00B058FD724DF29C48575AB7F1FF88318F108A2ED49AE7A51EB74E9468F91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 142 e7fbad-e7fbaf 143 e7fbe5-e7fc5e 142->143 144 e7fbb1-e7fbd8 call e7da04 142->144 145 e7fc60-e7fc66 143->145 146 e7fc69-e7fc70 143->146 150 e7fbdd-e7fbde 144->150 145->146 148 e7fc72-e7fc78 146->148 149 e7fc7b-e7fd1a CreateWindowExW 146->149 148->149 152 e7fd23-e7fd5b 149->152 153 e7fd1c-e7fd22 149->153 157 e7fd5d-e7fd60 152->157 158 e7fd68 152->158 153->152 157->158 159 e7fd69 158->159 159->159
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00E7FD0A
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.626129148.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e70000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: 9b3663f26c0644f713fd70459e1b5de31c9af4268ffd2d1631df1824d24c57df
                                              • Instruction ID: 0f952361028864a52a7199c394e6a57df89b54519b777b9c2145996895c1a741
                                              • Opcode Fuzzy Hash: 9b3663f26c0644f713fd70459e1b5de31c9af4268ffd2d1631df1824d24c57df
                                              • Instruction Fuzzy Hash: C451EEB1D04209AFDF15CF99C884ADDBFB1BF48314F24816AE918AB220D775A955CF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 160 e7fbec-e7fc5e 161 e7fc60-e7fc66 160->161 162 e7fc69-e7fc70 160->162 161->162 163 e7fc72-e7fc78 162->163 164 e7fc7b-e7fcb3 162->164 163->164 165 e7fcbb-e7fd1a CreateWindowExW 164->165 166 e7fd23-e7fd5b 165->166 167 e7fd1c-e7fd22 165->167 171 e7fd5d-e7fd60 166->171 172 e7fd68 166->172 167->166 171->172 173 e7fd69 172->173 173->173
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00E7FD0A
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.626129148.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e70000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: 00fd0d7a48f1c32d7ac56697325cb8d3018af2a1201c143a63d0aa1fa7e7f161
                                              • Instruction ID: 114790ad3ce454e338b426005ec9724e6439abd6a9039355335ee9e73dd1a4da
                                              • Opcode Fuzzy Hash: 00fd0d7a48f1c32d7ac56697325cb8d3018af2a1201c143a63d0aa1fa7e7f161
                                              • Instruction Fuzzy Hash: 0C51BEB1D003099FDF14CF99D884ADEBBB5FF88314F24852AE819AB210D774A985CF91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 174 e7fbf8-e7fc5e 175 e7fc60-e7fc66 174->175 176 e7fc69-e7fc70 174->176 175->176 177 e7fc72-e7fc78 176->177 178 e7fc7b-e7fcb3 176->178 177->178 179 e7fcbb-e7fd1a CreateWindowExW 178->179 180 e7fd23-e7fd5b 179->180 181 e7fd1c-e7fd22 179->181 185 e7fd5d-e7fd60 180->185 186 e7fd68 180->186 181->180 185->186 187 e7fd69 186->187 187->187
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00E7FD0A
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.626129148.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e70000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: f0f5d0e03bb2ca7a3f493611e2a73890a9a8fc077e4a163c1f4d279631b2bdfb
                                              • Instruction ID: 1fbcb8b2082d4cc214055dc49dbee4f4f3872e22680228565e25e818fe2349b8
                                              • Opcode Fuzzy Hash: f0f5d0e03bb2ca7a3f493611e2a73890a9a8fc077e4a163c1f4d279631b2bdfb
                                              • Instruction Fuzzy Hash: 3041AFB1D003099FDF14CF99C884ADEFBB5BF48314F24852AE819AB210D775A985CF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 188 e7fe15-e7fe17 189 e7fe1d-e7fe1f 188->189 190 e7fe19-e7fe1b 188->190 191 e7fe25 189->191 192 e7fe21-e7fe23 call e7da3c 189->192 190->189 200 e7fe27 call e7fe15 191->200 201 e7fe27 call e7fe40 191->201 192->191 194 e7fe28-e7fe3a 195 e7fe40-e7feaa SetWindowLongW 194->195 196 e7fe3c-e7fe3f 194->196 197 e7feb3-e7fec7 195->197 198 e7feac-e7feb2 195->198 196->195 198->197 200->194 201->194
                                              APIs
                                              • SetWindowLongW.USER32(?,?,?), ref: 00E7FE9D
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.626129148.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e70000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: LongWindow
                                              • String ID:
                                              • API String ID: 1378638983-0
                                              • Opcode ID: 3b44341745a57b7c7c94ba7dd26fae66dd12446710f7642ca7d4989c8e1f9b20
                                              • Instruction ID: 524fd3955774dc0898af83efc3210bd92b65d7c81a58fae2edc7f3040884b013
                                              • Opcode Fuzzy Hash: 3b44341745a57b7c7c94ba7dd26fae66dd12446710f7642ca7d4989c8e1f9b20
                                              • Instruction Fuzzy Hash: BF217C75804248DFCB10DF95D585BDEBBF4EF48324F04845AE858B7222D375A944CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 202 e7bcf9-e7bcfe 203 e7bd00-e7bd94 DuplicateHandle 202->203 204 e7bd96-e7bd9c 203->204 205 e7bd9d-e7bdba 203->205 204->205
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E7BD87
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.626129148.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e70000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: c3db8e9e2e55c9d991d0db11227f20207b59e4fc3fc3921c8bfbbcc0a2c61e05
                                              • Instruction ID: 80a40a2aad8afe5064048ecec0181f15a2213ba11e7061807ff91dfdebcea18e
                                              • Opcode Fuzzy Hash: c3db8e9e2e55c9d991d0db11227f20207b59e4fc3fc3921c8bfbbcc0a2c61e05
                                              • Instruction Fuzzy Hash: 2321E6B5900209AFDB10CF99D584AEEFBF4EB48324F14841AE958A7310D378A955CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 209 e7bd00-e7bd94 DuplicateHandle 210 e7bd96-e7bd9c 209->210 211 e7bd9d-e7bdba 209->211 210->211
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E7BD87
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.626129148.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e70000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: c17e0fdf8a9d513e6671edb6ad9557f91c758cccb22f0dfd486776d1e70ac59f
                                              • Instruction ID: 1eb64d6232303a671ad5a70b43c05a7d0c03a049b08c4d10c8f5e16e38baf56a
                                              • Opcode Fuzzy Hash: c17e0fdf8a9d513e6671edb6ad9557f91c758cccb22f0dfd486776d1e70ac59f
                                              • Instruction Fuzzy Hash: 8F21C4B59042099FDB10CF99D584ADEFBF9EB48324F14841AE958A7310D378A954CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 215 e79849-e7984a 216 e79850-e79890 215->216 217 e7984c-e7984e 215->217 218 e79892-e79895 216->218 219 e79898-e798c7 LoadLibraryExW 216->219 217->216 218->219 220 e798d0-e798ed 219->220 221 e798c9-e798cf 219->221 221->220
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 00E798BA
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.626129148.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e70000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 2251a9a6462d85a51a2c93c7377f8264e26efcc7a11892e289a1666e71ea4edb
                                              • Instruction ID: f6e093fe0d8ddc1a3f64f22966fc942343c23be2594177a8afe277bec6846684
                                              • Opcode Fuzzy Hash: 2251a9a6462d85a51a2c93c7377f8264e26efcc7a11892e289a1666e71ea4edb
                                              • Instruction Fuzzy Hash: A211F2B69042099FDB14CF9AC484ADEFBF4EF89324F04842EE919A7600C775A945CFA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 224 e79850-e79890 225 e79892-e79895 224->225 226 e79898-e798c7 LoadLibraryExW 224->226 225->226 227 e798d0-e798ed 226->227 228 e798c9-e798cf 226->228 228->227
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 00E798BA
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.626129148.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e70000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: b035a18e9d29b442f359b3a16d3ed2b749650cfc1dd39b3e3ab11c361d796607
                                              • Instruction ID: b07b5347b739243d944140a80fb7a0b1bb078fa079c76f5755490afe6df7295c
                                              • Opcode Fuzzy Hash: b035a18e9d29b442f359b3a16d3ed2b749650cfc1dd39b3e3ab11c361d796607
                                              • Instruction Fuzzy Hash: 031114B2D042098FDB10CF9AC484ADEFBF4EB89324F04842ED419B7600C374A545CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 231 e78704-e79608 233 e79610-e7963b GetModuleHandleW 231->233 234 e7960a-e7960d 231->234 235 e79644-e79658 233->235 236 e7963d-e79643 233->236 234->233 236->235
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,00E793FB), ref: 00E7962E
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.626129148.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e70000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: b92e40ca773cb59b2db23e807a7e833c68d997d8099564f6e62054a617bb8b44
                                              • Instruction ID: b16dd8e029facea888e5144df286f9da38aff5cdf73e0fca10e2ef1ed04aedb5
                                              • Opcode Fuzzy Hash: b92e40ca773cb59b2db23e807a7e833c68d997d8099564f6e62054a617bb8b44
                                              • Instruction Fuzzy Hash: 2C11F0B1D046098BCB10CF9AD444BDEFBF4EF89324F14852AD859B7651C3B4A54ACFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 238 e7fe40-e7feaa SetWindowLongW 239 e7feb3-e7fec7 238->239 240 e7feac-e7feb2 238->240 240->239
                                              APIs
                                              • SetWindowLongW.USER32(?,?,?), ref: 00E7FE9D
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.626129148.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e70000_Ki8WlC0ddA.jbxd
                                              Similarity
                                              • API ID: LongWindow
                                              • String ID:
                                              • API String ID: 1378638983-0
                                              • Opcode ID: d1f5b51a93b71a1ec929293bfedcdfea2a0a462e093efb5c2711e8ab6e42c052
                                              • Instruction ID: 8c670fca0cc1c00a5c05f71bf6114c200c5f2cee5443d7ddb388029e2c46b4b5
                                              • Opcode Fuzzy Hash: d1f5b51a93b71a1ec929293bfedcdfea2a0a462e093efb5c2711e8ab6e42c052
                                              • Instruction Fuzzy Hash: C91112B58002098FDB10CF99D585BDEFBF8EB88324F10841AE958B3700C3B4A944CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%