Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ki8WlC0ddA.exe

Overview

General Information

Sample Name:Ki8WlC0ddA.exe
Analysis ID:623786
MD5:0f8819270f261881bdfdbb15fe4f4d7c
SHA1:7473c2e2683725955a0e9ace00fa1dea2a884a4c
SHA256:42bc81c2809d6ae05c7eac0f21374e297f21acb00d3baee3a2c6a14b963a058a
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • Ki8WlC0ddA.exe (PID: 4340 cmdline: "C:\Users\user\Desktop\Ki8WlC0ddA.exe" MD5: 0F8819270F261881BDFDBB15FE4F4D7C)
    • powershell.exe (PID: 6620 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nbbxvA.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 2892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 2896 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nbbxvA" /XML "C:\Users\user\AppData\Local\Temp\tmp39F4.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5288 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Ki8WlC0ddA.exe (PID: 5072 cmdline: C:\Users\user\Desktop\Ki8WlC0ddA.exe MD5: 0F8819270F261881BDFDBB15FE4F4D7C)
    • Ki8WlC0ddA.exe (PID: 6192 cmdline: C:\Users\user\Desktop\Ki8WlC0ddA.exe MD5: 0F8819270F261881BDFDBB15FE4F4D7C)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "6d38b3f5-33a1-41b7-a7f2-d8fe2b39", "Group": "happy man", "Domain1": "91.193.75.221", "Domain2": "", "Port": 4040, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 30 entries
      SourceRuleDescriptionAuthorStrings
      12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xb184:$x1: NanoCore.ClientPluginHost
      • 0xb1b1:$x2: IClientNetworkHost
      12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xb184:$x2: NanoCore.ClientPluginHost
      • 0xc25f:$s4: PipeCreated
      • 0xb19e:$s5: IClientLoggingHost
      12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
        • 0xb14f:$x2: NanoCore.ClientPlugin
        • 0xb184:$x3: NanoCore.ClientPluginHost
        • 0xb143:$i2: IClientData
        • 0xb165:$i3: IClientNetwork
        • 0xb174:$i5: IClientDataHost
        • 0xb19e:$i6: IClientLoggingHost
        • 0xb1b1:$i7: IClientNetworkHost
        • 0xb1c4:$i8: IClientUIHost
        • 0xb1d2:$i9: IClientNameObjectCollection
        • 0xb1ee:$i10: IClientReadOnlyNameObjectCollection
        • 0xaf41:$s1: ClientPlugin
        • 0xb158:$s1: ClientPlugin
        • 0x10179:$s6: get_ClientSettings
        12.2.Ki8WlC0ddA.exe.53b0000.8.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xd9ad:$x1: NanoCore.ClientPluginHost
        • 0xd9da:$x2: IClientNetworkHost
        Click to see the 91 entries

        AV Detection

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Ki8WlC0ddA.exe, ProcessId: 6192, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Ki8WlC0ddA.exe, ProcessId: 6192, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Ki8WlC0ddA.exe, ProcessId: 6192, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Ki8WlC0ddA.exe, ProcessId: 6192, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6d38b3f5-33a1-41b7-a7f2-d8fe2b39", "Group": "happy man", "Domain1": "91.193.75.221", "Domain2": "", "Port": 4040, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Source: Ki8WlC0ddA.exeVirustotal: Detection: 63%Perma Link
        Source: Ki8WlC0ddA.exeReversingLabs: Detection: 57%
        Source: 91.193.75.221Avira URL Cloud: Label: malware
        Source: 91.193.75.221Virustotal: Detection: 7%Perma Link
        Source: C:\Users\user\AppData\Roaming\nbbxvA.exeReversingLabs: Detection: 57%
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTR
        Source: Ki8WlC0ddA.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\nbbxvA.exeJoe Sandbox ML: detected
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpackAvira: Label: TR/NanoCore.fadte
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: Ki8WlC0ddA.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: Ki8WlC0ddA.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking

        barindex
        Source: Malware configuration extractorURLs:
        Source: Malware configuration extractorURLs: 91.193.75.221
        Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
        Source: global trafficTCP traffic: 192.168.2.7:49773 -> 91.193.75.221:4040
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.w
        Source: Ki8WlC0ddA.exe, 00000000.00000003.364222229.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364443941.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363651716.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364147023.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364089454.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363616640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363685426.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363932125.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364045961.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364363138.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363844392.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
        Source: Ki8WlC0ddA.exe, 00000000.00000003.363490557.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363651716.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363616640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363685426.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363844392.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.comu
        Source: Ki8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: Ki8WlC0ddA.exe, 00000000.00000003.395751162.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.395884258.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.395670428.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agfamonotype.Y
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com-s
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com.t
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTC
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTCy
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comUI
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.2
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.v
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comorm
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.compor
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comue~
        Source: Ki8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com.TTFY
        Source: Ki8WlC0ddA.exe, 00000000.00000003.379402399.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: Ki8WlC0ddA.exe, 00000000.00000003.375811643.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378773035.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377613113.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377907580.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378618291.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378378752.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377755305.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377461785.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378216379.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377405776.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378116495.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377284810.00000000054E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersn
        Source: Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerso
        Source: Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376318651.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersw
        Source: Ki8WlC0ddA.exe, 00000000.00000003.375925606.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comC
        Source: Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379065859.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376229750.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
        Source: Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378684255.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378287930.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378450907.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comL.TTF
        Source: Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381204043.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsv
        Source: Ki8WlC0ddA.exe, 00000000.00000003.396815587.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396519860.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396425870.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.397001492.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396346589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438648214.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396600351.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comce2
        Source: Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378684255.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378287930.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378450907.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
        Source: Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdC
        Source: Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgrita
        Source: Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378684255.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376318651.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378287930.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378450907.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comicv
        Source: Ki8WlC0ddA.exe, 00000000.00000003.396815587.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396519860.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396425870.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.397001492.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396295063.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396346589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438648214.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396600351.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comiono(
        Source: Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comitudC
        Source: Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comlic3
        Source: Ki8WlC0ddA.exe, 00000000.00000003.396600351.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm
        Source: Ki8WlC0ddA.exe, 00000000.00000003.375925606.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.375811643.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.como
        Source: Ki8WlC0ddA.exe, 00000000.00000003.381734424.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382272498.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382092130.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381834849.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381349447.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382462785.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382572076.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381204043.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379065859.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comok
        Source: Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379402399.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comonyF(
        Source: Ki8WlC0ddA.exe, 00000000.00000003.375811643.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comtoF
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367326593.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367144392.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: Ki8WlC0ddA.exe, 00000000.00000003.366859147.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366705899.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/a
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnF
        Source: Ki8WlC0ddA.exe, 00000000.00000003.367326593.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367144392.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnM
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368395220.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnicr
        Source: Ki8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnl
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnn
        Source: Ki8WlC0ddA.exe, 00000000.00000003.382572076.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
        Source: Ki8WlC0ddA.exe, 00000000.00000003.382572076.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/.
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: Ki8WlC0ddA.exe, 00000000.00000003.382966537.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.393199530.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.393959605.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: Ki8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.krF
        Source: Ki8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.krm
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373438207.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373111641.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372973754.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373048058.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/(
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/3
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/:
        Source: Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/C
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Lodi
        Source: Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
        Source: Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/iv
        Source: Ki8WlC0ddA.exe, 00000000.00000003.373508650.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372776835.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373405020.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373230539.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373729462.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372572237.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372663553.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373563351.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373470016.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373668116.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373438207.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373111641.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372973754.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373048058.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/3
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/C
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/k-s
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/r
        Source: Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372776835.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372572237.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372663553.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372973754.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373048058.00000000054D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/t
        Source: Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376318651.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
        Source: Ki8WlC0ddA.exe, 00000000.00000003.361655494.00000000054B2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: Ki8WlC0ddA.exe, 00000000.00000003.361655494.00000000054B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comaK
        Source: Ki8WlC0ddA.exe, 00000000.00000003.361655494.00000000054B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comt;
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366501762.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: Ki8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krFo
        Source: Ki8WlC0ddA.exe, 00000000.00000003.366501762.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krc
        Source: Ki8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366501762.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krn-u
        Source: Ki8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krttp://w
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368320050.00000000009DC000.00000004.00000020.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
        Source: Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn%
        Source: Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn-s
        Source: Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnG
        Source: Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnUI
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTR

        System Summary

        barindex
        Source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.2.Ki8WlC0ddA.exe.5130000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.5130000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.25ed490.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.2.Ki8WlC0ddA.exe.29a7c98.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.29a7c98.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.25e6244.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.Ki8WlC0ddA.exe.25f96dc.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Ki8WlC0ddA.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.5130000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.5130000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.5130000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.25ed490.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.29a7c98.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.29a7c98.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.29a7c98.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.25e6244.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.25f96dc.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 0_2_0230E6F0
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 0_2_0230C2A4
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 0_2_0230E6E8
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 12_2_00E7E480
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 12_2_00E7E471
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 12_2_00E7BBD4
        Source: Ki8WlC0ddA.exeBinary or memory string: OriginalFilename vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exe, 00000000.00000002.439624478.0000000006E00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exe, 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exeBinary or memory string: OriginalFilename vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exeBinary or memory string: OriginalFilename vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.635007701.0000000005E00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.626506471.0000000002971000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exeBinary or memory string: OriginalFilenameTYPEFL.exe> vs Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: nbbxvA.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: Ki8WlC0ddA.exeVirustotal: Detection: 63%
        Source: Ki8WlC0ddA.exeReversingLabs: Detection: 57%
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeFile read: C:\Users\user\Desktop\Ki8WlC0ddA.exeJump to behavior
        Source: Ki8WlC0ddA.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\Ki8WlC0ddA.exe "C:\Users\user\Desktop\Ki8WlC0ddA.exe"
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nbbxvA.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nbbxvA" /XML "C:\Users\user\AppData\Local\Temp\tmp39F4.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Users\user\Desktop\Ki8WlC0ddA.exe C:\Users\user\Desktop\Ki8WlC0ddA.exe
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Users\user\Desktop\Ki8WlC0ddA.exe C:\Users\user\Desktop\Ki8WlC0ddA.exe
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nbbxvA.exe
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nbbxvA" /XML "C:\Users\user\AppData\Local\Temp\tmp39F4.tmp
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Users\user\Desktop\Ki8WlC0ddA.exe C:\Users\user\Desktop\Ki8WlC0ddA.exe
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Users\user\Desktop\Ki8WlC0ddA.exe C:\Users\user\Desktop\Ki8WlC0ddA.exe
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeFile created: C:\Users\user\AppData\Roaming\nbbxvA.exeJump to behavior
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeFile created: C:\Users\user\AppData\Local\Temp\tmp39F4.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@11/9@0/1
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5288:120:WilError_01
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeMutant created: \Sessions\1\BaseNamedObjects\DnZEhaaQkSWDfaoNzJby
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2892:120:WilError_01
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{6d38b3f5-33a1-41b7-a7f2-d8fe2b391c1c}
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: Ki8WlC0ddA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: Ki8WlC0ddA.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Data Obfuscation

        barindex
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 0_2_0011A224 push es; ret
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 0_2_0230F6F0 push eax; iretd
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 9_2_0043A224 push es; ret
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeCode function: 12_2_005AA224 push es; ret
        Source: initial sampleStatic PE information: section name: .text entropy: 7.94239606201
        Source: initial sampleStatic PE information: section name: .text entropy: 7.94239606201
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeFile created: C:\Users\user\AppData\Roaming\nbbxvA.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nbbxvA" /XML "C:\Users\user\AppData\Local\Temp\tmp39F4.tmp

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeFile opened: C:\Users\user\Desktop\Ki8WlC0ddA.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.25ed490.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.25e6244.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.25f96dc.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTR
        Source: Ki8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
        Source: Ki8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exe TID: 5000Thread sleep time: -45733s >= -30000s
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exe TID: 5376Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2220Thread sleep time: -7378697629483816s >= -30000s
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exe TID: 4940Thread sleep time: -23058430092136925s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7376
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1195
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeWindow / User API: threadDelayed 4795
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeWindow / User API: threadDelayed 4828
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeWindow / User API: foregroundWindowGot 801
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeThread delayed: delay time: 45733
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeThread delayed: delay time: 922337203685477
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.625940839.0000000000D0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllAu4
        Source: Ki8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: Ki8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
        Source: Ki8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
        Source: Ki8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess token adjusted: Debug
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeMemory written: C:\Users\user\Desktop\Ki8WlC0ddA.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nbbxvA.exe
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nbbxvA.exe
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nbbxvA.exe
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nbbxvA" /XML "C:\Users\user\AppData\Local\Temp\tmp39F4.tmp
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Users\user\Desktop\Ki8WlC0ddA.exe C:\Users\user\Desktop\Ki8WlC0ddA.exe
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeProcess created: C:\Users\user\Desktop\Ki8WlC0ddA.exe C:\Users\user\Desktop\Ki8WlC0ddA.exe
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.627077052.0000000002A59000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 0000000C.00000002.635105585.000000000632E000.00000004.00000010.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 0000000C.00000002.634784582.0000000005CFD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.626701160.00000000029ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerD$
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.635167640.000000000679E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerp
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.627077052.0000000002A59000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 0000000C.00000002.626701160.00000000029ED000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 0000000C.00000002.630015520.0000000002DCE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager|$
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.629494799.0000000002D5A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerDZ
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.632864994.0000000005ACB000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: lProgram Manager
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.627077052.0000000002A59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerHa
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.627077052.0000000002A59000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 0000000C.00000002.629277294.0000000002D23000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 0000000C.00000002.629494799.0000000002D5A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerph
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Users\user\Desktop\Ki8WlC0ddA.exe VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Users\user\Desktop\Ki8WlC0ddA.exe VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\Ki8WlC0ddA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Ki8WlC0ddA.exe, 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Ki8WlC0ddA.exe, 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.626506471.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Ki8WlC0ddA.exe, 0000000C.00000002.626506471.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b4629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.53b0000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bff1c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39bb0e6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.0.Ki8WlC0ddA.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.3722d70.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.Ki8WlC0ddA.exe.39c4545.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36a5b30.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Ki8WlC0ddA.exe.36f0350.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 4340, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Ki8WlC0ddA.exe PID: 6192, type: MEMORYSTR
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Scheduled Task/Job
        1
        Scheduled Task/Job
        112
        Process Injection
        1
        Masquerading
        11
        Input Capture
        1
        Query Registry
        Remote Services11
        Input Capture
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Scheduled Task/Job
        11
        Disable or Modify Tools
        LSASS Memory21
        Security Software Discovery
        Remote Desktop Protocol11
        Archive Collected Data
        Exfiltration Over Bluetooth1
        Non-Standard Port
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
        Virtualization/Sandbox Evasion
        Security Account Manager2
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Remote Access Software
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
        Process Injection
        NTDS21
        Virtualization/Sandbox Evasion
        Distributed Component Object ModelInput CaptureScheduled Transfer1
        Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Deobfuscate/Decode Files or Information
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common1
        Hidden Files and Directories
        Cached Domain Credentials1
        File and Directory Discovery
        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items2
        Obfuscated Files or Information
        DCSync12
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
        Software Packing
        Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Ki8WlC0ddA.exe63%VirustotalBrowse
        Ki8WlC0ddA.exe57%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        Ki8WlC0ddA.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\nbbxvA.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\nbbxvA.exe57%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        SourceDetectionScannerLabelLinkDownload
        12.2.Ki8WlC0ddA.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        12.2.Ki8WlC0ddA.exe.53b0000.8.unpack100%AviraTR/NanoCore.fadteDownload File
        12.0.Ki8WlC0ddA.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        12.0.Ki8WlC0ddA.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        12.0.Ki8WlC0ddA.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        12.0.Ki8WlC0ddA.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        12.0.Ki8WlC0ddA.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        No Antivirus matches
        SourceDetectionScannerLabelLink
        0%Avira URL Cloudsafe
        http://www.carterandcone.compor0%Avira URL Cloudsafe
        http://www.sandoll.co.krttp://w0%Avira URL Cloudsafe
        91.193.75.2218%VirustotalBrowse
        91.193.75.221100%Avira URL Cloudmalware
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/:0%URL Reputationsafe
        http://www.fontbureau.comgrita0%URL Reputationsafe
        http://www.carterandcone.comUI0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/30%URL Reputationsafe
        http://www.founder.com.cn/cn/a0%URL Reputationsafe
        http://www.fontbureau.comalsv0%Avira URL Cloudsafe
        http://www.sajatypeworks.comaK0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/(0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.goodfont.co.krm0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.fontbureau.comC0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cn-s0%Avira URL Cloudsafe
        http://www.fontbureau.comicv0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Lodi0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.fontbureau.comonyF(0%Avira URL Cloudsafe
        http://www.agfamonotype.Y0%Avira URL Cloudsafe
        http://www.fontbureau.com.TTFY0%Avira URL Cloudsafe
        http://www.carterandcone.com.t0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/C0%URL Reputationsafe
        http://www.sandoll.co.krc0%Avira URL Cloudsafe
        http://en.w0%URL Reputationsafe
        http://www.goodfont.co.krF0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.carterandcone.como.20%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/t0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/r0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/iv0%Avira URL Cloudsafe
        http://www.sajatypeworks.comt;0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnicr0%URL Reputationsafe
        http://www.carterandcone.com-s0%Avira URL Cloudsafe
        http://www.fontbureau.comok0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cnG0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/C0%URL Reputationsafe
        http://www.fontbureau.comitudC0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cnM0%URL Reputationsafe
        http://www.zhongyicts.com.cnUI0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/30%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.founder.com.cn/cnF0%URL Reputationsafe
        http://www.zhongyicts.com.cn%0%Avira URL Cloudsafe
        http://www.carterandcone.como.v0%Avira URL Cloudsafe
        http://www.fontbureau.comiono(0%Avira URL Cloudsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cnn0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.comu0%URL Reputationsafe
        http://www.founder.com.cn/cnl0%URL Reputationsafe
        http://www.sandoll.co.krFo0%Avira URL Cloudsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.fontbureau.comF0%URL Reputationsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.fontbureau.comL.TTF0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.fontbureau.comd0%URL Reputationsafe
        http://www.fontbureau.comce20%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/k-s0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.galapagosdesign.com/.0%Avira URL Cloudsafe
        http://www.carterandcone.comTCy0%Avira URL Cloudsafe
        http://www.carterandcone.comorm0%Avira URL Cloudsafe
        http://www.monotype.0%URL Reputationsafe
        http://www.carterandcone.comue~0%Avira URL Cloudsafe
        http://www.fontbureau.comm0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.fontbureau.como0%URL Reputationsafe
        http://www.fontbureau.comdC0%Avira URL Cloudsafe
        http://www.sandoll.co.krn-u0%URL Reputationsafe
        http://www.fontbureau.comlic30%Avira URL Cloudsafe
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        true
        • Avira URL Cloud: safe
        low
        91.193.75.221true
        • 8%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.carterandcone.comporKi8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.sandoll.co.krttp://wKi8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designersKi8WlC0ddA.exe, 00000000.00000003.379402399.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.sajatypeworks.comKi8WlC0ddA.exe, 00000000.00000003.361655494.00000000054B2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.founder.com.cn/cn/cTheKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.jiyu-kobo.co.jp/:Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comgritaKi8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.carterandcone.comUIKi8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.jiyu-kobo.co.jp/3Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.founder.com.cn/cn/aKi8WlC0ddA.exe, 00000000.00000003.366859147.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366705899.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comalsvKi8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381204043.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.sajatypeworks.comaKKi8WlC0ddA.exe, 00000000.00000003.361655494.00000000054B2000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.galapagosdesign.com/DPleaseKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.jiyu-kobo.co.jp/Y0Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.ascendercorp.com/typedesigners.htmlKi8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.jiyu-kobo.co.jp/(Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.urwpp.deDPleaseKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.goodfont.co.krmKi8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.zhongyicts.com.cnKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameKi8WlC0ddA.exe, 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comCKi8WlC0ddA.exe, 00000000.00000003.375925606.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.zhongyicts.com.cn-sKi8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.comicvKi8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378684255.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376318651.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378287930.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378450907.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/LodiKi8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.galapagosdesign.com/Ki8WlC0ddA.exe, 00000000.00000003.382572076.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.comonyF(Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379402399.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://www.agfamonotype.YKi8WlC0ddA.exe, 00000000.00000003.395751162.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.395884258.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.395670428.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com.TTFYKi8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.carterandcone.com.tKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/CKi8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.sandoll.co.krcKi8WlC0ddA.exe, 00000000.00000003.366501762.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://en.wKi8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.goodfont.co.krFKi8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.carterandcone.comlKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers/frere-jones.htmlKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378773035.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377613113.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377907580.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378618291.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378378752.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377755305.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377461785.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378216379.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377405776.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378116495.00000000054E3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377284810.00000000054E3000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.carterandcone.como.2Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.jiyu-kobo.co.jp/tKi8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372776835.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372572237.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372663553.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372973754.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373048058.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/rKi8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/ivKi8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.sajatypeworks.comt;Ki8WlC0ddA.exe, 00000000.00000003.361655494.00000000054B2000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.founder.com.cn/cnicrKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368395220.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.carterandcone.com-sKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.comokKi8WlC0ddA.exe, 00000000.00000003.381734424.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382272498.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382092130.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381834849.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381349447.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382462785.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.382572076.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381204043.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379065859.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.zhongyicts.com.cnGKi8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designersGKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designers/?Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.jiyu-kobo.co.jp/jp/CKi8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.comitudCKi8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.founder.com.cn/cn/bTheKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cnMKi8WlC0ddA.exe, 00000000.00000003.367326593.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367144392.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.zhongyicts.com.cnUIKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.tiro.comKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368320050.00000000009DC000.00000004.00000020.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/jp/3Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.goodfont.co.krKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comKi8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnFKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368109204.00000000054D1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.zhongyicts.com.cn%Ki8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.carterandcone.como.vKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.comiono(Ki8WlC0ddA.exe, 00000000.00000003.396815587.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396519860.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396425870.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.397001492.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396295063.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396346589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438648214.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396600351.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.typography.netDKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnnKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369008885.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmKi8WlC0ddA.exe, 00000000.00000003.382966537.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.393199530.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.393959605.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.comKi8WlC0ddA.exe, 00000000.00000003.364222229.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364443941.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363651716.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364147023.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364089454.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363616640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363685426.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363932125.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364045961.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.364363138.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363844392.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.comuKi8WlC0ddA.exe, 00000000.00000003.363490557.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363651716.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363616640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363685426.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.363844392.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnlKi8WlC0ddA.exe, 00000000.00000003.367376622.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sandoll.co.krFoKi8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designerswKi8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376318651.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fonts.comKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.sandoll.co.krKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366501762.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sakkal.comKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersoKi8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designersnKi8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.apache.org/licenses/LICENSE-2.0Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.comKi8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comFKi8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379065859.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376229750.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comTCKi8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comL.TTFKi8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378684255.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378287930.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378450907.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/Ki8WlC0ddA.exe, 00000000.00000003.373508650.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372776835.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373405020.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373230539.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373729462.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372572237.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372663553.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373563351.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373470016.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373668116.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373438207.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373111641.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372973754.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373048058.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comdKi8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378872487.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378684255.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378287930.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378450907.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comce2Ki8WlC0ddA.exe, 00000000.00000003.396815587.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396519860.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396425870.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.397001492.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396346589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438648214.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.396600351.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/k-sKi8WlC0ddA.exe, 00000000.00000003.372036060.00000000054CE000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372180731.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371707918.00000000054CC000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.371925042.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372327843.00000000054D2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNKi8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cnKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369325878.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368531585.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367879789.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367594620.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367775102.00000000054D1000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367326593.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368839959.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369524251.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.367144392.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369220038.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368638844.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.368138951.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/.Ki8WlC0ddA.exe, 00000000.00000003.382572076.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.carterandcone.comTCyKi8WlC0ddA.exe, 00000000.00000003.370994517.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370802204.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370928366.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.carterandcone.comormKi8WlC0ddA.exe, 00000000.00000003.370294710.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369716108.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.369976743.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370152722.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.monotype.Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376318651.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comue~Ki8WlC0ddA.exe, 00000000.00000003.370548701.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.370421646.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  http://www.fontbureau.commKi8WlC0ddA.exe, 00000000.00000003.396600351.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/Ki8WlC0ddA.exe, 00000000.00000003.372483656.00000000054D4000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373438207.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373111641.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.372973754.00000000054D3000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.373048058.00000000054D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comoKi8WlC0ddA.exe, 00000000.00000003.375925606.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.375811643.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers8Ki8WlC0ddA.exe, 00000000.00000002.438805105.00000000066C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.comdCKi8WlC0ddA.exe, 00000000.00000003.378051983.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377714029.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377528969.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377187088.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377828569.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376639491.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377265560.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377000583.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376434741.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.378195328.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376374552.00000000054D0000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377444886.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.377341586.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.376779662.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.sandoll.co.krn-uKi8WlC0ddA.exe, 00000000.00000003.366638740.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.366501762.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comlic3Ki8WlC0ddA.exe, 00000000.00000003.380737640.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379926306.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380650301.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.381062648.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380349987.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379817883.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380069589.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380842783.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.379542986.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380465527.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380552548.00000000054CB000.00000004.00000800.00020000.00000000.sdmp, Ki8WlC0ddA.exe, 00000000.00000003.380167449.00000000054CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.com/designers/Ki8WlC0ddA.exe, 00000000.00000003.375811643.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      91.193.75.221
                                      unknownSerbia
                                      209623DAVID_CRAIGGGtrue
                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                      Analysis ID:623786
                                      Start date and time: 10/05/202220:20:482022-05-10 20:20:48 +02:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 12m 19s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:Ki8WlC0ddA.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:24
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@11/9@0/1
                                      EGA Information:
                                      • Successful, ratio: 66.7%
                                      HDC Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                      • TCP Packets have been reduced to 100
                                      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                      • Execution Graph export aborted for target Ki8WlC0ddA.exe, PID 5072 because there are no executed function
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      20:22:22API Interceptor713x Sleep call for process: Ki8WlC0ddA.exe modified
                                      20:22:29API Interceptor41x Sleep call for process: powershell.exe modified
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):1308
                                      Entropy (8bit):5.345811588615766
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                      MD5:2E016B886BDB8389D2DD0867BE55F87B
                                      SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                      SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                      SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):22188
                                      Entropy (8bit):5.598160129279729
                                      Encrypted:false
                                      SSDEEP:384:9tCDe0wtHZHCIiYS0nIjultIA47nv3g3hInAML+6fmAV7ROidGZQvnI+++g:J5HCI7TIClt7c667KepNG+g
                                      MD5:E415DB43B45288B4347C4C3A5CFD1DA2
                                      SHA1:3C015F553C4D8A12D6AF92C59E1AD0780277CEAC
                                      SHA-256:62414F327822AF8C2CF75394C9E38227D812D42902619E22A93A02B917937A6B
                                      SHA-512:85DE19317306C8FA24153CAD13F9A1DD538A4D95C34EE4B1479B5AA2DB9539C2632FAA29F316CD3FEBBB2C9904AA908AD1F755433B27F595104C4045C1996AEC
                                      Malicious:false
                                      Reputation:low
                                      Preview:@...e...........d.......K...D.<.9.....X...-..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                      File Type:XML 1.0 document, ASCII text
                                      Category:dropped
                                      Size (bytes):1609
                                      Entropy (8bit):5.126414460395903
                                      Encrypted:false
                                      SSDEEP:24:2di4+S2qh/dp1Kd+y1modHUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtqxvn:cgeHMYrFdOFzOzN33ODOiDdKrsuT+v
                                      MD5:D817721B3222A81D668B278F4C7FB15E
                                      SHA1:D9E3B938D94E3C4168E5595893B86DF03D1D62BE
                                      SHA-256:0C94818867E19163C0A62116BB70A70D3265E0F43FD1FEEF41C98D38EF82AFB3
                                      SHA-512:36D16F4F18A2EFC43A0EA3C74D87AEDE9017F2977ADF223B417ABBF8695971396AC541933CB23252E714E90DF2727F2FA8A105FBF12406CA80D1247A71FD92CA
                                      Malicious:true
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvai
                                      Process:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                      File Type:Non-ISO extended-ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):8
                                      Entropy (8bit):3.0
                                      Encrypted:false
                                      SSDEEP:3:VUt:V0
                                      MD5:923A7A6E01C3242596B4D950D6B20EFA
                                      SHA1:330D952A60F1ECE84AE8A4881E3EA1BA35DBAE3D
                                      SHA-256:9BDC8A1B234E8533091289DB12DFFA06A876EE6B7252DDD52D0AE593029A258A
                                      SHA-512:C1BD44A61BFD0690C8BA754BD9BED08B276A56FF304A994C0B22901AA3F0F9DB00F14852142EC56895E7C0BA2B1E7AE3A0B6E8DA7CC90914FDC82D13D7952CB6
                                      Malicious:true
                                      Preview:h.*..2.H
                                      Process:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):657920
                                      Entropy (8bit):7.935629638737511
                                      Encrypted:false
                                      SSDEEP:12288:tYV82L2IIafm7N8VVfcYKMrc/nQPnEuBTVFKNFgq/TDm7r3:mu2KafmIfcY3Y/qHBZ8zlmH
                                      MD5:0F8819270F261881BDFDBB15FE4F4D7C
                                      SHA1:7473C2E2683725955A0E9ACE00FA1DEA2A884A4C
                                      SHA-256:42BC81C2809D6AE05C7EAC0F21374E297F21ACB00D3BAEE3A2C6A14B963A058A
                                      SHA-512:473808E146741876941FD96557FB290E707D645636AB039FD873C21023EC97345474D4272D20CBA63AC2F22097B2734DB0EB8817C3430907861CF60040DFD984
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 57%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....xb..............0.............B.... ... ....@.. .......................`............@.....................................O.... .......................@....................................................... ............... ..H............text...H.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................$.......H.......d...$O..............hF..........................................^..}.....(.......(.....*.0..+.........,..{.......+....,...{....o........(.....*...s....}......(......r...po.....*....0............{.....+..*&...}....*..s....}.....(........}.....(.....*..s....}.....(.......r...p}.....(.....*.0..`.........{....s.....+:....7...%..;.o......{.........................sw...o.......o ...%......-..o!....*...{.....o"...(#...($...(%.....{.....o.....*.0..?...........7...o........7..
                                      Process:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):5813
                                      Entropy (8bit):5.3818582682762255
                                      Encrypted:false
                                      SSDEEP:96:BZA65NQqDo1Z9ZO65NQqDo1ZJEq8jZyx65NQqDo1ZkN5MMxZe:jT
                                      MD5:1DA29D1894E77B9BA3977D096D10811E
                                      SHA1:D0DD941D535DD09DF3E4278C416BFECA0B1A5AEA
                                      SHA-256:6E785EE9F4562FC8CF7C81AA9DEC1A10B2A45CE3F5F2B978792E185926E2C106
                                      SHA-512:06A35D253A194C207E4B2045EDB577E18040835EAEC5F7632896E011EEE2F374F85EC01A63FB00F8F05CB9E3E5E0DD89822CC982862646584D9D48036A1A7671
                                      Malicious:false
                                      Preview:.**********************..Windows PowerShell transcript start..Start time: 20220510202229..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 849224 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\nbbxvA.exe..Process ID: 6620..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220510202229..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\nbbxvA.exe..**********************..Windows PowerShell transcript start..Start time: 20220510202546..Username: computer\user..RunAs User: DESKTOP-
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.935629638737511
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:Ki8WlC0ddA.exe
                                      File size:657920
                                      MD5:0f8819270f261881bdfdbb15fe4f4d7c
                                      SHA1:7473c2e2683725955a0e9ace00fa1dea2a884a4c
                                      SHA256:42bc81c2809d6ae05c7eac0f21374e297f21acb00d3baee3a2c6a14b963a058a
                                      SHA512:473808e146741876941fd96557fb290e707d645636ab039fd873c21023ec97345474d4272d20cba63ac2f22097b2734db0eb8817c3430907861cf60040dfd984
                                      SSDEEP:12288:tYV82L2IIafm7N8VVfcYKMrc/nQPnEuBTVFKNFgq/TDm7r3:mu2KafmIfcY3Y/qHBZ8zlmH
                                      TLSH:74E42228AB784B63CB3953F2A251429403F73B6C7021FF595D9128EE29D3F421662F93
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....xb..............0.............B.... ... ....@.. .......................`............@................................
                                      Icon Hash:00828e8e8686b000
                                      Entrypoint:0x4a1e42
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                      Time Stamp:0x6278C699 [Mon May 9 07:45:29 2022 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:v4.0.30319
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xa1df00x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xa20000x5bc.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xa40000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000x9fe480xa0000False0.938734436035data7.94239606201IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                      .rsrc0xa20000x5bc0x600False0.425130208333data4.12036037241IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xa40000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_VERSION0xa20900x32cdata
                                      RT_MANIFEST0xa23cc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      DescriptionData
                                      Translation0x0000 0x04b0
                                      LegalCopyrightCopyright 2017
                                      Assembly Version1.0.0.0
                                      InternalNameTYPEFL.exe
                                      FileVersion1.0.0.0
                                      CompanyName
                                      LegalTrademarks
                                      Comments
                                      ProductNameProjektOkienka
                                      ProductVersion1.0.0.0
                                      FileDescriptionProjektOkienka
                                      OriginalFilenameTYPEFL.exe
                                      TimestampSource PortDest PortSource IPDest IP
                                      May 10, 2022 20:22:42.503998041 CEST497734040192.168.2.791.193.75.221
                                      May 10, 2022 20:22:42.545831919 CEST40404977391.193.75.221192.168.2.7
                                      May 10, 2022 20:22:43.080039978 CEST497734040192.168.2.791.193.75.221
                                      May 10, 2022 20:22:43.122967005 CEST40404977391.193.75.221192.168.2.7
                                      May 10, 2022 20:22:43.673918009 CEST497734040192.168.2.791.193.75.221
                                      May 10, 2022 20:22:43.715069056 CEST40404977391.193.75.221192.168.2.7
                                      May 10, 2022 20:22:47.804563999 CEST497774040192.168.2.791.193.75.221
                                      May 10, 2022 20:22:47.845561028 CEST40404977791.193.75.221192.168.2.7
                                      May 10, 2022 20:22:48.439953089 CEST497774040192.168.2.791.193.75.221
                                      May 10, 2022 20:22:48.480900049 CEST40404977791.193.75.221192.168.2.7
                                      May 10, 2022 20:22:49.130536079 CEST497774040192.168.2.791.193.75.221
                                      May 10, 2022 20:22:49.171638966 CEST40404977791.193.75.221192.168.2.7
                                      May 10, 2022 20:22:53.175615072 CEST497824040192.168.2.791.193.75.221
                                      May 10, 2022 20:22:53.216734886 CEST40404978291.193.75.221192.168.2.7
                                      May 10, 2022 20:22:53.737314939 CEST497824040192.168.2.791.193.75.221
                                      May 10, 2022 20:22:53.778502941 CEST40404978291.193.75.221192.168.2.7
                                      May 10, 2022 20:22:54.440404892 CEST497824040192.168.2.791.193.75.221
                                      May 10, 2022 20:22:54.481309891 CEST40404978291.193.75.221192.168.2.7
                                      May 10, 2022 20:22:58.527121067 CEST497844040192.168.2.791.193.75.221
                                      May 10, 2022 20:22:58.568022013 CEST40404978491.193.75.221192.168.2.7
                                      May 10, 2022 20:22:59.128285885 CEST497844040192.168.2.791.193.75.221
                                      May 10, 2022 20:22:59.169106960 CEST40404978491.193.75.221192.168.2.7
                                      May 10, 2022 20:22:59.737725019 CEST497844040192.168.2.791.193.75.221
                                      May 10, 2022 20:22:59.778687000 CEST40404978491.193.75.221192.168.2.7
                                      May 10, 2022 20:23:03.798732042 CEST497914040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:03.840225935 CEST40404979191.193.75.221192.168.2.7
                                      May 10, 2022 20:23:04.441392899 CEST497914040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:04.482343912 CEST40404979191.193.75.221192.168.2.7
                                      May 10, 2022 20:23:05.128849983 CEST497914040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:05.169980049 CEST40404979191.193.75.221192.168.2.7
                                      May 10, 2022 20:23:09.196000099 CEST497934040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:09.240170956 CEST40404979391.193.75.221192.168.2.7
                                      May 10, 2022 20:23:09.941673994 CEST497934040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:09.985274076 CEST40404979391.193.75.221192.168.2.7
                                      May 10, 2022 20:23:10.629247904 CEST497934040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:10.670150995 CEST40404979391.193.75.221192.168.2.7
                                      May 10, 2022 20:23:15.073534012 CEST497964040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:15.115176916 CEST40404979691.193.75.221192.168.2.7
                                      May 10, 2022 20:23:15.645334959 CEST497964040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:15.686187029 CEST40404979691.193.75.221192.168.2.7
                                      May 10, 2022 20:23:16.239181042 CEST497964040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:16.280177116 CEST40404979691.193.75.221192.168.2.7
                                      May 10, 2022 20:23:20.570420027 CEST497974040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:20.611356974 CEST40404979791.193.75.221192.168.2.7
                                      May 10, 2022 20:23:21.302205086 CEST497974040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:21.343199968 CEST40404979791.193.75.221192.168.2.7
                                      May 10, 2022 20:23:21.895936966 CEST497974040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:21.936805964 CEST40404979791.193.75.221192.168.2.7
                                      May 10, 2022 20:23:25.944119930 CEST498014040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:25.985007048 CEST40404980191.193.75.221192.168.2.7
                                      May 10, 2022 20:23:26.505623102 CEST498014040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:26.546449900 CEST40404980191.193.75.221192.168.2.7
                                      May 10, 2022 20:23:27.208856106 CEST498014040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:27.249741077 CEST40404980191.193.75.221192.168.2.7
                                      May 10, 2022 20:23:31.266387939 CEST498044040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:31.307337999 CEST40404980491.193.75.221192.168.2.7
                                      May 10, 2022 20:23:31.972084045 CEST498044040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:32.012989998 CEST40404980491.193.75.221192.168.2.7
                                      May 10, 2022 20:23:32.709341049 CEST498044040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:32.750113964 CEST40404980491.193.75.221192.168.2.7
                                      May 10, 2022 20:23:36.799782991 CEST498104040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:36.840713978 CEST40404981091.193.75.221192.168.2.7
                                      May 10, 2022 20:23:37.346612930 CEST498104040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:37.387509108 CEST40404981091.193.75.221192.168.2.7
                                      May 10, 2022 20:23:38.036809921 CEST498104040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:38.077678919 CEST40404981091.193.75.221192.168.2.7
                                      May 10, 2022 20:23:42.136236906 CEST498384040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:42.177123070 CEST40404983891.193.75.221192.168.2.7
                                      May 10, 2022 20:23:42.687381029 CEST498384040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:42.728276968 CEST40404983891.193.75.221192.168.2.7
                                      May 10, 2022 20:23:43.235841990 CEST498384040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:43.278156996 CEST40404983891.193.75.221192.168.2.7
                                      May 10, 2022 20:23:47.293898106 CEST498584040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:47.334815025 CEST40404985891.193.75.221192.168.2.7
                                      May 10, 2022 20:23:47.852050066 CEST498584040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:47.892920017 CEST40404985891.193.75.221192.168.2.7
                                      May 10, 2022 20:23:48.398979902 CEST498584040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:48.439848900 CEST40404985891.193.75.221192.168.2.7
                                      May 10, 2022 20:23:52.450114012 CEST498644040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:52.493285894 CEST40404986491.193.75.221192.168.2.7
                                      May 10, 2022 20:23:53.149414062 CEST498644040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:53.190282106 CEST40404986491.193.75.221192.168.2.7
                                      May 10, 2022 20:23:53.836975098 CEST498644040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:53.878005981 CEST40404986491.193.75.221192.168.2.7
                                      May 10, 2022 20:23:58.045922041 CEST498654040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:58.086949110 CEST40404986591.193.75.221192.168.2.7
                                      May 10, 2022 20:23:58.587449074 CEST498654040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:58.628504992 CEST40404986591.193.75.221192.168.2.7
                                      May 10, 2022 20:23:59.134346008 CEST498654040192.168.2.791.193.75.221
                                      May 10, 2022 20:23:59.175266027 CEST40404986591.193.75.221192.168.2.7
                                      May 10, 2022 20:24:03.182952881 CEST498664040192.168.2.791.193.75.221
                                      May 10, 2022 20:24:03.223838091 CEST40404986691.193.75.221192.168.2.7
                                      May 10, 2022 20:24:03.729336977 CEST498664040192.168.2.791.193.75.221
                                      May 10, 2022 20:24:03.770442009 CEST40404986691.193.75.221192.168.2.7
                                      May 10, 2022 20:24:04.275322914 CEST498664040192.168.2.791.193.75.221
                                      May 10, 2022 20:24:04.316310883 CEST40404986691.193.75.221192.168.2.7
                                      May 10, 2022 20:24:08.323231936 CEST498674040192.168.2.791.193.75.221
                                      May 10, 2022 20:24:08.364171982 CEST40404986791.193.75.221192.168.2.7
                                      May 10, 2022 20:24:08.869493008 CEST498674040192.168.2.791.193.75.221
                                      May 10, 2022 20:24:08.910485029 CEST40404986791.193.75.221192.168.2.7

                                      Click to jump to process

                                      Target ID:0
                                      Start time:20:22:01
                                      Start date:10/05/2022
                                      Path:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\Ki8WlC0ddA.exe"
                                      Imagebase:0x110000
                                      File size:657920 bytes
                                      MD5 hash:0F8819270F261881BDFDBB15FE4F4D7C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.435002351.00000000024C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.437559429.00000000036A5000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      Reputation:low

                                      Target ID:4
                                      Start time:20:22:26
                                      Start date:10/05/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nbbxvA.exe
                                      Imagebase:0xf0000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Reputation:high

                                      Target ID:5
                                      Start time:20:22:26
                                      Start date:10/05/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7bab80000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:6
                                      Start time:20:22:26
                                      Start date:10/05/2022
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nbbxvA" /XML "C:\Users\user\AppData\Local\Temp\tmp39F4.tmp
                                      Imagebase:0xcf0000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:7
                                      Start time:20:22:28
                                      Start date:10/05/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7bab80000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:9
                                      Start time:20:22:30
                                      Start date:10/05/2022
                                      Path:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                      Imagebase:0x430000
                                      File size:657920 bytes
                                      MD5 hash:0F8819270F261881BDFDBB15FE4F4D7C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low

                                      Target ID:12
                                      Start time:20:22:32
                                      Start date:10/05/2022
                                      Path:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\Ki8WlC0ddA.exe
                                      Imagebase:0x5a0000
                                      File size:657920 bytes
                                      MD5 hash:0F8819270F261881BDFDBB15FE4F4D7C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.427017575.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.624692987.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000C.00000002.632329502.0000000005130000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.424343119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.424852171.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.425529951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.630145120.00000000039B9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000C.00000002.632605760.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      Reputation:low

                                      No disassembly