Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DN8slYDJr3.exe

Overview

General Information

Sample Name:DN8slYDJr3.exe
Analysis ID:626765
MD5:a6fe8903e741154bc80352d0ee73efff
SHA1:772e00c83eeae03ea4c7433f737b8d6a1d8b967e
SHA256:63ad21733d5e1db06faa9c863422889ae1f185116e02b45a50259e286ee42e50
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • DN8slYDJr3.exe (PID: 6440 cmdline: "C:\Users\user\Desktop\DN8slYDJr3.exe" MD5: A6FE8903E741154BC80352D0EE73EFFF)
    • powershell.exe (PID: 6788 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IulEJNIqTKEFv.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 6816 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IulEJNIqTKEFv" /XML "C:\Users\user\AppData\Local\Temp\tmp2ADE.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 7012 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "2dd75230-c203-4336-94aa-262a8b3e", "Group": "Mallow", "Domain1": "mallow.3utilities.com", "Domain2": "mallow2.3utilities.com", "Port": 83, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
00000008.00000000.283747964.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000008.00000000.283747964.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000008.00000000.283747964.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000000.00000002.289573778.0000000004171000.00000004.00000800.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1a93b5:$x1: NanoCore.ClientPluginHost
    • 0x1a93f2:$x2: IClientNetworkHost
    • 0x1acf25:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000000.00000002.289573778.0000000004171000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 18 entries
      SourceRuleDescriptionAuthorStrings
      8.3.RegSvcs.exe.1671486.0.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x39eb:$x1: NanoCore.ClientPluginHost
      • 0xb9eb:$x1: NanoCore.ClientPluginHost
      • 0x3a24:$x2: IClientNetworkHost
      • 0xba24:$x2: IClientNetworkHost
      8.3.RegSvcs.exe.1671486.0.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0x39eb:$x2: NanoCore.ClientPluginHost
      • 0xb9eb:$x2: NanoCore.ClientPluginHost
      • 0x3b36:$s4: PipeCreated
      • 0xbb36:$s4: PipeCreated
      • 0x3a05:$s5: IClientLoggingHost
      • 0xba05:$s5: IClientLoggingHost
      8.3.RegSvcs.exe.1671486.0.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0x3a8b:$x2: NanoCore.ClientPlugin
      • 0xba8b:$x2: NanoCore.ClientPlugin
      • 0x39eb:$x3: NanoCore.ClientPluginHost
      • 0xb9eb:$x3: NanoCore.ClientPluginHost
      • 0x3aa1:$i3: IClientNetwork
      • 0xbaa1:$i3: IClientNetwork
      • 0x3a43:$i5: IClientDataHost
      • 0xba43:$i5: IClientDataHost
      • 0x3a05:$i6: IClientLoggingHost
      • 0xba05:$i6: IClientLoggingHost
      • 0x3a24:$i7: IClientNetworkHost
      • 0xba24:$i7: IClientNetworkHost
      • 0x426c:$i9: IClientNameObjectCollection
      • 0xc26c:$i9: IClientNameObjectCollection
      • 0x3741:$s1: ClientPlugin
      • 0x3a94:$s1: ClientPlugin
      • 0xb741:$s1: ClientPlugin
      • 0xba94:$s1: ClientPlugin
      • 0x4680:$s2: EndPoint
      • 0xc680:$s2: EndPoint
      • 0x4371:$s3: IPAddress
      0.2.DN8slYDJr3.exe.477a1c0.6.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe38d:$x1: NanoCore.ClientPluginHost
      • 0xe3ca:$x2: IClientNetworkHost
      • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0.2.DN8slYDJr3.exe.477a1c0.6.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe105:$x1: NanoCore Client.exe
      • 0xe38d:$x2: NanoCore.ClientPluginHost
      • 0xf9c6:$s1: PluginCommand
      • 0xf9ba:$s2: FileCommand
      • 0x1086b:$s3: PipeExists
      • 0x16622:$s4: PipeCreated
      • 0xe3b7:$s5: IClientLoggingHost
      Click to see the 49 entries

      AV Detection

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 7012, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 7012, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Stealing of Sensitive Information

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 7012, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 7012, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Timestamp:192.168.2.3109.248.150.17149771832816766 05/15/22-05:56:07.894508
      SID:2816766
      Source Port:49771
      Destination Port:83
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:109.248.150.171192.168.2.383497542841753 05/15/22-05:55:28.352765
      SID:2841753
      Source Port:83
      Destination Port:49754
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:109.248.150.171192.168.2.383497452841753 05/15/22-05:54:57.696804
      SID:2841753
      Source Port:83
      Destination Port:49745
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:109.248.150.171192.168.2.383497492841753 05/15/22-05:55:02.792533
      SID:2841753
      Source Port:83
      Destination Port:49749
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3109.248.150.17149738832816766 05/15/22-05:54:43.813398
      SID:2816766
      Source Port:49738
      Destination Port:83
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3109.248.150.17149751832816766 05/15/22-05:55:09.867717
      SID:2816766
      Source Port:49751
      Destination Port:83
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:109.248.150.171192.168.2.383497582841753 05/15/22-05:55:39.462032
      SID:2841753
      Source Port:83
      Destination Port:49758
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3109.248.150.17149743832816766 05/15/22-05:54:52.689575
      SID:2816766
      Source Port:49743
      Destination Port:83
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3109.248.150.17149770832816766 05/15/22-05:55:59.950651
      SID:2816766
      Source Port:49770
      Destination Port:83
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3109.248.150.17149752832816766 05/15/22-05:55:15.941176
      SID:2816766
      Source Port:49752
      Destination Port:83
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:109.248.150.171192.168.2.383497692841753 05/15/22-05:55:51.676335
      SID:2841753
      Source Port:83
      Destination Port:49769
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3109.248.150.17149753832816766 05/15/22-05:55:21.968753
      SID:2816766
      Source Port:49753
      Destination Port:83
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:109.248.150.171192.168.2.383498022841753 05/15/22-05:56:18.173297
      SID:2841753
      Source Port:83
      Destination Port:49802
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:109.248.150.171192.168.2.383497782841753 05/15/22-05:56:13.009421
      SID:2841753
      Source Port:83
      Destination Port:49778
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3109.248.150.17149757832816766 05/15/22-05:55:34.302368
      SID:2816766
      Source Port:49757
      Destination Port:83
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:109.248.150.171192.168.2.383498202841753 05/15/22-05:56:28.052052
      SID:2841753
      Source Port:83
      Destination Port:49820
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3109.248.150.17149767832816766 05/15/22-05:55:46.492067
      SID:2816766
      Source Port:49767
      Destination Port:83
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 0.2.DN8slYDJr3.exe.477a1c0.6.raw.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "2dd75230-c203-4336-94aa-262a8b3e", "Group": "Mallow", "Domain1": "mallow.3utilities.com", "Domain2": "mallow2.3utilities.com", "Port": 83, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Source: DN8slYDJr3.exeVirustotal: Detection: 55%Perma Link
      Source: DN8slYDJr3.exeReversingLabs: Detection: 63%
      Source: mallow.3utilities.comAvira URL Cloud: Label: phishing
      Source: mallow2.3utilities.comAvira URL Cloud: Label: phishing
      Source: C:\Users\user\AppData\Roaming\IulEJNIqTKEFv.exeReversingLabs: Detection: 63%
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.477a1c0.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.46ff5a0.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.477a1c0.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.428da08.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.423d9e8.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.46ff5a0.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000008.00000000.283747964.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.289573778.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.282381940.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.284049855.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.294913817.00000000046FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.283054100.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7012, type: MEMORYSTR
      Source: DN8slYDJr3.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Roaming\IulEJNIqTKEFv.exeJoe Sandbox ML: detected
      Source: 8.0.RegSvcs.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 8.0.RegSvcs.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 8.0.RegSvcs.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 8.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 8.0.RegSvcs.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: DN8slYDJr3.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: DN8slYDJr3.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RegSvcs.exe, 00000008.00000003.298782987.0000000001670000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\cVYxLBjISq\src\obj\Debug\DynamicAssemblyFl.pdb source: DN8slYDJr3.exe, IulEJNIqTKEFv.exe.0.dr
      Source: Binary string: System.pdb source: RegSvcs.exe, 00000008.00000003.464970407.0000000006B63000.00000004.00000800.00020000.00000000.sdmp

      Networking

      barindex
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49738 -> 109.248.150.171:83
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49743 -> 109.248.150.171:83
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 109.248.150.171:83 -> 192.168.2.3:49745
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 109.248.150.171:83 -> 192.168.2.3:49749
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49751 -> 109.248.150.171:83
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49752 -> 109.248.150.171:83
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49753 -> 109.248.150.171:83
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 109.248.150.171:83 -> 192.168.2.3:49754
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49757 -> 109.248.150.171:83
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 109.248.150.171:83 -> 192.168.2.3:49758
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49767 -> 109.248.150.171:83
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 109.248.150.171:83 -> 192.168.2.3:49769
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49770 -> 109.248.150.171:83
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49771 -> 109.248.150.171:83
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 109.248.150.171:83 -> 192.168.2.3:49778
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 109.248.150.171:83 -> 192.168.2.3:49802
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 109.248.150.171:83 -> 192.168.2.3:49820
      Source: Malware configuration extractorURLs: mallow2.3utilities.com
      Source: Malware configuration extractorURLs: mallow.3utilities.com
      Source: Joe Sandbox ViewASN Name: DATACLUBLV DATACLUBLV
      Source: global trafficTCP traffic: 192.168.2.3:49738 -> 109.248.150.171:83
      Source: DN8slYDJr3.exe, 00000000.00000003.241072805.0000000006126000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.w
      Source: DN8slYDJr3.exe, 00000000.00000003.240622717.0000000006143000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.240647322.0000000006142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.wikipedia
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
      Source: DN8slYDJr3.exe, 00000000.00000002.287530312.0000000003171000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: DN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: DN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com3
      Source: DN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comI.TTF
      Source: DN8slYDJr3.exe, 00000000.00000003.285353913.0000000006120000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.257046421.000000000612A000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000002.296409775.0000000006120000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma3
      Source: DN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsF
      Source: DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsF1
      Source: DN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcom
      Source: DN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
      Source: DN8slYDJr3.exe, 00000000.00000003.285353913.0000000006120000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.257046421.000000000612A000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000002.296409775.0000000006120000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgretao
      Source: DN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comituV
      Source: DN8slYDJr3.exe, 00000000.00000003.285353913.0000000006120000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.257046421.000000000612A000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000002.296409775.0000000006120000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.commV
      Source: DN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.commr
      Source: DN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comueetd
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
      Source: DN8slYDJr3.exe, 00000000.00000003.242899291.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242745769.0000000006127000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: DN8slYDJr3.exe, 00000000.00000003.242950568.0000000006127000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnB
      Source: DN8slYDJr3.exe, 00000000.00000003.242950568.0000000006127000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnH
      Source: DN8slYDJr3.exe, 00000000.00000003.242745769.0000000006127000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cna-di
      Source: DN8slYDJr3.exe, 00000000.00000003.242950568.0000000006127000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnr-cM
      Source: DN8slYDJr3.exe, 00000000.00000003.252858930.0000000006158000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: DN8slYDJr3.exe, 00000000.00000003.253233910.0000000006158000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.252988978.0000000006158000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.252858930.0000000006158000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.253034202.0000000006158000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.253083642.0000000006158000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/JQ
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: DN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/%
      Source: DN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/3
      Source: DN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/:
      Source: DN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0V
      Source: DN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0o
      Source: DN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/d
      Source: DN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
      Source: DN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/H
      Source: DN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/r
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: DN8slYDJr3.exe, 00000000.00000003.241147992.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.240973696.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241983094.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243249366.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244612243.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241744081.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243416460.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241544747.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243092635.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241399274.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242884518.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243629445.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241508783.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243942870.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241924169.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242265504.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241318656.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244093097.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243557493.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241016314.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242425287.000000000613B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com;
      Source: DN8slYDJr3.exe, 00000000.00000003.241147992.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.240973696.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241983094.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243249366.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244612243.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241744081.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243416460.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241544747.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243092635.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241399274.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242884518.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243629445.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241508783.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243942870.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241924169.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242265504.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241318656.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244093097.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243557493.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241016314.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242425287.000000000613B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com_
      Source: DN8slYDJr3.exe, 00000000.00000003.241147992.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.240973696.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241983094.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243249366.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244612243.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241744081.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243416460.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241544747.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243092635.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241399274.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242884518.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243629445.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241508783.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243942870.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241924169.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242265504.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241318656.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244093097.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243557493.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241016314.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242425287.000000000613B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comaH
      Source: DN8slYDJr3.exe, 00000000.00000003.241147992.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.240973696.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241983094.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243249366.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244612243.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241744081.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243416460.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241544747.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243092635.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241399274.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242884518.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243629445.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241508783.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243942870.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241924169.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242265504.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241318656.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244093097.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243557493.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241016314.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242425287.000000000613B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.come%
      Source: DN8slYDJr3.exe, 00000000.00000003.241147992.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.240973696.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241983094.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243249366.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244612243.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241744081.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243416460.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241544747.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243092635.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241399274.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242884518.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243629445.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241508783.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243942870.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241924169.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242265504.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241318656.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244093097.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243557493.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241016314.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242425287.000000000613B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comivd
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: unknownDNS traffic detected: queries for: mallow.3utilities.com
      Source: DN8slYDJr3.exe, 00000000.00000002.286967871.00000000014BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.477a1c0.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.46ff5a0.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.477a1c0.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.428da08.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.423d9e8.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.46ff5a0.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000008.00000000.283747964.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.289573778.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.282381940.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.284049855.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.294913817.00000000046FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.283054100.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7012, type: MEMORYSTR

      System Summary

      barindex
      Source: 8.3.RegSvcs.exe.1671486.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.3.RegSvcs.exe.1671486.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.DN8slYDJr3.exe.477a1c0.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.DN8slYDJr3.exe.477a1c0.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.DN8slYDJr3.exe.477a1c0.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 8.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 8.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 8.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.DN8slYDJr3.exe.46ff5a0.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.DN8slYDJr3.exe.46ff5a0.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.DN8slYDJr3.exe.46ff5a0.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.DN8slYDJr3.exe.477a1c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.DN8slYDJr3.exe.477a1c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.DN8slYDJr3.exe.477a1c0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 8.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 8.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.DN8slYDJr3.exe.428da08.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.DN8slYDJr3.exe.428da08.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.DN8slYDJr3.exe.428da08.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.DN8slYDJr3.exe.423d9e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.DN8slYDJr3.exe.423d9e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.DN8slYDJr3.exe.423d9e8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.DN8slYDJr3.exe.46ff5a0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.DN8slYDJr3.exe.46ff5a0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.DN8slYDJr3.exe.46ff5a0.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000008.00000000.283747964.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000008.00000000.283747964.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.289573778.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.289573778.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000008.00000000.282381940.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000008.00000000.282381940.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000008.00000000.284049855.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000008.00000000.284049855.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.294913817.00000000046FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.294913817.00000000046FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000008.00000000.283054100.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000008.00000000.283054100.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: RegSvcs.exe PID: 7012, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: RegSvcs.exe PID: 7012, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: DN8slYDJr3.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 8.3.RegSvcs.exe.1671486.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.3.RegSvcs.exe.1671486.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 8.3.RegSvcs.exe.1671486.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.DN8slYDJr3.exe.477a1c0.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.DN8slYDJr3.exe.477a1c0.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.DN8slYDJr3.exe.477a1c0.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.DN8slYDJr3.exe.477a1c0.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 8.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 8.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 8.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 8.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 8.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 8.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.DN8slYDJr3.exe.46ff5a0.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.DN8slYDJr3.exe.46ff5a0.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.DN8slYDJr3.exe.46ff5a0.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.DN8slYDJr3.exe.46ff5a0.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.DN8slYDJr3.exe.477a1c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.DN8slYDJr3.exe.477a1c0.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.DN8slYDJr3.exe.477a1c0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 8.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 8.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 8.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 8.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.DN8slYDJr3.exe.428da08.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.DN8slYDJr3.exe.428da08.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.DN8slYDJr3.exe.428da08.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.DN8slYDJr3.exe.423d9e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.DN8slYDJr3.exe.423d9e8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.DN8slYDJr3.exe.423d9e8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.DN8slYDJr3.exe.46ff5a0.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.DN8slYDJr3.exe.46ff5a0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.DN8slYDJr3.exe.46ff5a0.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000008.00000000.283747964.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000008.00000000.283747964.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.289573778.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.289573778.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000008.00000000.282381940.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000008.00000000.282381940.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000008.00000000.284049855.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000008.00000000.284049855.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.294913817.00000000046FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.294913817.00000000046FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000008.00000000.283054100.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000008.00000000.283054100.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: RegSvcs.exe PID: 7012, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: RegSvcs.exe PID: 7012, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_00DC4438
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_0305E660
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_0305E670
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_0305C67C
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_07D095C8
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_07D00040
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_07D00025
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_080F8C70
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_080FA000
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_080F003B
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_080F0040
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_00DC2208
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_00DC4724
      Source: DN8slYDJr3.exe, 00000000.00000002.286967871.00000000014BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs DN8slYDJr3.exe
      Source: DN8slYDJr3.exe, 00000000.00000002.297137759.0000000007A10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs DN8slYDJr3.exe
      Source: DN8slYDJr3.exe, 00000000.00000002.285793123.0000000000E94000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDynamicAssemblyFl.exeF vs DN8slYDJr3.exe
      Source: DN8slYDJr3.exeBinary or memory string: OriginalFilenameDynamicAssemblyFl.exeF vs DN8slYDJr3.exe
      Source: DN8slYDJr3.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: IulEJNIqTKEFv.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: DN8slYDJr3.exeVirustotal: Detection: 55%
      Source: DN8slYDJr3.exeReversingLabs: Detection: 63%
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeFile read: C:\Users\user\Desktop\DN8slYDJr3.exeJump to behavior
      Source: DN8slYDJr3.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Users\user\Desktop\DN8slYDJr3.exe "C:\Users\user\Desktop\DN8slYDJr3.exe"
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IulEJNIqTKEFv.exe
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IulEJNIqTKEFv" /XML "C:\Users\user\AppData\Local\Temp\tmp2ADE.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IulEJNIqTKEFv.exe
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IulEJNIqTKEFv" /XML "C:\Users\user\AppData\Local\Temp\tmp2ADE.tmp
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeFile created: C:\Users\user\AppData\Roaming\IulEJNIqTKEFv.exeJump to behavior
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2ADE.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@9/12@17/2
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: 8.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 8.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 8.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 8.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 8.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 8.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 8.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 8.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 8.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 8.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6964:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6808:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{2dd75230-c203-4336-94aa-262a8b3ec25e}
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeMutant created: \Sessions\1\BaseNamedObjects\eXhgKvZdAKXPeesglo
      Source: 8.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 8.0.RegSvcs.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 8.0.RegSvcs.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 8.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 8.0.RegSvcs.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 8.0.RegSvcs.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 8.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 8.0.RegSvcs.exe.400000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 8.0.RegSvcs.exe.400000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: DN8slYDJr3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: DN8slYDJr3.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: DN8slYDJr3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RegSvcs.exe, 00000008.00000003.298782987.0000000001670000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\cVYxLBjISq\src\obj\Debug\DynamicAssemblyFl.pdb source: DN8slYDJr3.exe, IulEJNIqTKEFv.exe.0.dr
      Source: Binary string: System.pdb source: RegSvcs.exe, 00000008.00000003.464970407.0000000006B63000.00000004.00000800.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: DN8slYDJr3.exe, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: IulEJNIqTKEFv.exe.0.dr, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.2.DN8slYDJr3.exe.dc0000.0.unpack, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.0.DN8slYDJr3.exe.dc0000.0.unpack, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 8.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 8.0.RegSvcs.exe.400000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 8.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 8.0.RegSvcs.exe.400000.2.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 8.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 8.0.RegSvcs.exe.400000.3.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 8.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 8.0.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 8.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 8.0.RegSvcs.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: DN8slYDJr3.exe, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436D735574", "3046356264", "PagedOptionsDialog" } }, null, null)
      Source: IulEJNIqTKEFv.exe.0.dr, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436D735574", "3046356264", "PagedOptionsDialog" } }, null, null)
      Source: 0.2.DN8slYDJr3.exe.dc0000.0.unpack, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436D735574", "3046356264", "PagedOptionsDialog" } }, null, null)
      Source: 0.0.DN8slYDJr3.exe.dc0000.0.unpack, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436D735574", "3046356264", "PagedOptionsDialog" } }, null, null)
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_00DC9DBE pushad ; ret
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_00DCAB2A push eax; ret
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeCode function: 0_2_03057DC1 push 8C056C27h; iretd
      Source: initial sampleStatic PE information: section name: .text entropy: 7.95859467732
      Source: initial sampleStatic PE information: section name: .text entropy: 7.95859467732
      Source: 8.0.RegSvcs.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 8.0.RegSvcs.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 8.0.RegSvcs.exe.400000.2.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 8.0.RegSvcs.exe.400000.2.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 8.0.RegSvcs.exe.400000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 8.0.RegSvcs.exe.400000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 8.0.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 8.0.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 8.0.RegSvcs.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 8.0.RegSvcs.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeFile created: C:\Users\user\AppData\Roaming\IulEJNIqTKEFv.exeJump to dropped file

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IulEJNIqTKEFv" /XML "C:\Users\user\AppData\Local\Temp\tmp2ADE.tmp

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: Yara matchFile source: 00000000.00000002.287530312.0000000003171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: DN8slYDJr3.exe PID: 6440, type: MEMORYSTR
      Source: DN8slYDJr3.exe, 00000000.00000002.287530312.0000000003171000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
      Source: DN8slYDJr3.exe, 00000000.00000002.287530312.0000000003171000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
      Source: C:\Users\user\Desktop\DN8slYDJr3.exe TID: 6444Thread sleep time: -45733s >= -30000s
      Source: C:\Users\user\Desktop\DN8slYDJr3.exe TID: 6464Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7004Thread sleep time: -10145709240540247s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7235
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1501
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8128
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1187
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: foregroundWindowGot 887
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: foregroundWindowGot 728
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeThread delayed: delay time: 45733
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
      Source: DN8slYDJr3.exe, 00000000.00000002.287530312.0000000003171000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: DN8slYDJr3.exe, 00000000.00000002.287530312.0000000003171000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
      Source: RegSvcs.exe, 00000008.00000003.301860727.0000000001681000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000003.301649945.0000000001681000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000003.301346702.0000000001681000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000003.296273652.0000000001684000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000003.299403228.0000000001682000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000003.300880612.0000000001682000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000003.314354154.0000000001681000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000003.298720161.0000000001682000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000003.300554225.0000000001682000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000003.299010934.0000000001682000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000003.302040398.0000000001681000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllt
      Source: DN8slYDJr3.exe, 00000000.00000002.287530312.0000000003171000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
      Source: DN8slYDJr3.exe, 00000000.00000002.287530312.0000000003171000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 420000
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 422000
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 100F008
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IulEJNIqTKEFv.exe
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IulEJNIqTKEFv.exe
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IulEJNIqTKEFv.exe
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IulEJNIqTKEFv" /XML "C:\Users\user\AppData\Local\Temp\tmp2ADE.tmp
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Users\user\Desktop\DN8slYDJr3.exe VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Users\user\Desktop\DN8slYDJr3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.477a1c0.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.46ff5a0.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.477a1c0.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.428da08.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.423d9e8.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.46ff5a0.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000008.00000000.283747964.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.289573778.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.282381940.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.284049855.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.294913817.00000000046FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.283054100.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7012, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: RegSvcs.exe, 00000008.00000000.283747964.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RegSvcs.exe, 00000008.00000003.298782987.0000000001670000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RegSvcs.exe, 00000008.00000003.298782987.0000000001670000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.477a1c0.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.46ff5a0.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.477a1c0.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.428da08.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.423d9e8.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.DN8slYDJr3.exe.46ff5a0.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000008.00000000.283747964.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.289573778.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.282381940.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.284049855.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.294913817.00000000046FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.283054100.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7012, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Windows Management Instrumentation
      1
      Scheduled Task/Job
      211
      Process Injection
      1
      Masquerading
      1
      Input Capture
      211
      Security Software Discovery
      Remote Services1
      Input Capture
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default Accounts1
      Scheduled Task/Job
      Boot or Logon Initialization Scripts1
      Scheduled Task/Job
      11
      Disable or Modify Tools
      LSASS Memory1
      Process Discovery
      Remote Desktop Protocol11
      Archive Collected Data
      Exfiltration Over Bluetooth1
      Non-Standard Port
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
      Virtualization/Sandbox Evasion
      Security Account Manager21
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
      Remote Access Software
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)211
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer1
      Non-Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
      Deobfuscate/Decode Files or Information
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingData Transfer Size Limits11
      Application Layer Protocol
      Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common1
      Hidden Files and Directories
      Cached Domain Credentials12
      System Information Discovery
      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items2
      Obfuscated Files or Information
      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job23
      Software Packing
      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 626765 Sample: DN8slYDJr3.exe Startdate: 15/05/2022 Architecture: WINDOWS Score: 100 35 mallow.3utilities.com 2->35 41 Snort IDS alert for network traffic 2->41 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 13 other signatures 2->47 8 DN8slYDJr3.exe 7 2->8         started        signatures3 process4 file5 25 C:\Users\user\AppData\...\IulEJNIqTKEFv.exe, PE32 8->25 dropped 27 C:\...\IulEJNIqTKEFv.exe:Zone.Identifier, ASCII 8->27 dropped 29 C:\Users\user\AppData\Local\...\tmp2ADE.tmp, XML 8->29 dropped 31 C:\Users\user\AppData\...\DN8slYDJr3.exe.log, ASCII 8->31 dropped 49 Uses schtasks.exe or at.exe to add and modify task schedules 8->49 51 Writes to foreign memory regions 8->51 53 Adds a directory exclusion to Windows Defender 8->53 55 Injects a PE file into a foreign processes 8->55 12 RegSvcs.exe 9 8->12         started        17 powershell.exe 24 8->17         started        19 schtasks.exe 1 8->19         started        signatures6 process7 dnsIp8 37 mallow.3utilities.com 109.248.150.171, 49738, 49743, 49745 DATACLUBLV Russian Federation 12->37 39 192.168.2.1 unknown unknown 12->39 33 C:\Users\user\AppData\Roaming\...\run.dat, data 12->33 dropped 57 Hides that the sample has been downloaded from the Internet (zone.identifier) 12->57 21 conhost.exe 17->21         started        23 conhost.exe 19->23         started        file9 signatures10 process11

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      DN8slYDJr3.exe56%VirustotalBrowse
      DN8slYDJr3.exe63%ReversingLabsByteCode-MSIL.Spyware.Negasteal
      DN8slYDJr3.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\IulEJNIqTKEFv.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\IulEJNIqTKEFv.exe63%ReversingLabsByteCode-MSIL.Spyware.Negasteal
      SourceDetectionScannerLabelLinkDownload
      8.0.RegSvcs.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      8.0.RegSvcs.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      8.0.RegSvcs.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      8.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      8.0.RegSvcs.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      SourceDetectionScannerLabelLink
      mallow.3utilities.com3%VirustotalBrowse
      SourceDetectionScannerLabelLink
      http://www.fontbureau.comI.TTF0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/H0%URL Reputationsafe
      http://www.sajatypeworks.com;0%Avira URL Cloudsafe
      http://www.sajatypeworks.comivd0%Avira URL Cloudsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      mallow.3utilities.com3%VirustotalBrowse
      mallow.3utilities.com100%Avira URL Cloudphishing
      http://www.founder.com.cn/cnH0%URL Reputationsafe
      http://www.fontbureau.comalsF0%URL Reputationsafe
      http://www.founder.com.cn/cnB0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/:0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.fontbureau.comueetd0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/30%URL Reputationsafe
      http://www.galapagosdesign.com/JQ0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/Y0o0%Avira URL Cloudsafe
      http://www.fontbureau.com30%Avira URL Cloudsafe
      http://www.fontbureau.comcom0%URL Reputationsafe
      http://www.sajatypeworks.comaH0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/Y0V0%Avira URL Cloudsafe
      http://www.sajatypeworks.com_0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/%0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.fontbureau.commr0%Avira URL Cloudsafe
      http://www.founder.com.cn/cnr-cM0%Avira URL Cloudsafe
      http://www.fontbureau.comalsF10%Avira URL Cloudsafe
      http://www.galapagosdesign.com/0%URL Reputationsafe
      http://www.fontbureau.comgretao0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/jp/r0%URL Reputationsafe
      http://en.wikipedia0%URL Reputationsafe
      http://www.sajatypeworks.come%0%Avira URL Cloudsafe
      mallow2.3utilities.com100%Avira URL Cloudphishing
      http://www.founder.com.cn/cna-di0%Avira URL Cloudsafe
      http://www.fontbureau.commV0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
      http://www.fontbureau.comd0%URL Reputationsafe
      http://en.w0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.fontbureau.coma30%Avira URL Cloudsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.fontbureau.comituV0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/d0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      mallow.3utilities.com
      109.248.150.171
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      mallow.3utilities.comtrue
      • 3%, Virustotal, Browse
      • Avira URL Cloud: phishing
      unknown
      mallow2.3utilities.comtrue
      • Avira URL Cloud: phishing
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.fontbureau.com/designersGDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.comI.TTFDN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.fontbureau.com/designers/?DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.founder.com.cn/cn/bTheDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designers?DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.jiyu-kobo.co.jp/jp/HDN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.sajatypeworks.com;DN8slYDJr3.exe, 00000000.00000003.241147992.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.240973696.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241983094.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243249366.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244612243.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241744081.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243416460.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241544747.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243092635.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241399274.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242884518.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243629445.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241508783.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243942870.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241924169.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242265504.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241318656.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244093097.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243557493.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241016314.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242425287.000000000613B000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://www.sajatypeworks.comivdDN8slYDJr3.exe, 00000000.00000003.241147992.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.240973696.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241983094.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243249366.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244612243.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241744081.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243416460.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241544747.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243092635.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241399274.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242884518.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243629445.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241508783.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243942870.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241924169.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242265504.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241318656.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244093097.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243557493.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241016314.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242425287.000000000613B000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.tiro.comDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designersDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.goodfont.co.krDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cnHDN8slYDJr3.exe, 00000000.00000003.242950568.0000000006127000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.comalsFDN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cnBDN8slYDJr3.exe, 00000000.00000003.242950568.0000000006127000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.sajatypeworks.comDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.typography.netDDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cn/cTheDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/:DN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.galapagosdesign.com/staff/dennis.htmDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://fontfabrik.comDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.comueetdDN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.jiyu-kobo.co.jp/3DN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.galapagosdesign.com/JQDN8slYDJr3.exe, 00000000.00000003.253233910.0000000006158000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.252988978.0000000006158000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.252858930.0000000006158000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.253034202.0000000006158000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.253083642.0000000006158000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.jiyu-kobo.co.jp/Y0oDN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com3DN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.comcomDN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.sajatypeworks.comaHDN8slYDJr3.exe, 00000000.00000003.241147992.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.240973696.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241983094.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243249366.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244612243.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241744081.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243416460.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241544747.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243092635.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241399274.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242884518.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243629445.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241508783.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243942870.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241924169.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242265504.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241318656.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244093097.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243557493.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241016314.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242425287.000000000613B000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.galapagosdesign.com/DPleaseDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/Y0VDN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.sajatypeworks.com_DN8slYDJr3.exe, 00000000.00000003.241147992.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.240973696.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241983094.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243249366.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244612243.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241744081.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243416460.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241544747.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243092635.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241399274.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242884518.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243629445.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241508783.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243942870.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241924169.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242265504.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241318656.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244093097.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243557493.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241016314.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242425287.000000000613B000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.fonts.comDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.jiyu-kobo.co.jp/%DN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.sandoll.co.krDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.urwpp.deDPleaseDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.zhongyicts.com.cnDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDN8slYDJr3.exe, 00000000.00000002.287530312.0000000003171000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.sakkal.comDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.commrDN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.founder.com.cn/cnr-cMDN8slYDJr3.exe, 00000000.00000003.242950568.0000000006127000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.comalsF1DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.apache.org/licenses/LICENSE-2.0DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.comDN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.galapagosdesign.com/DN8slYDJr3.exe, 00000000.00000003.252858930.0000000006158000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comgretaoDN8slYDJr3.exe, 00000000.00000003.285353913.0000000006120000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.257046421.000000000612A000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000002.296409775.0000000006120000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/rDN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://en.wikipediaDN8slYDJr3.exe, 00000000.00000003.240622717.0000000006143000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.240647322.0000000006142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.come%DN8slYDJr3.exe, 00000000.00000003.241147992.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.240973696.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241983094.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243249366.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244612243.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241744081.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243416460.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241544747.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243092635.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241399274.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242884518.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243629445.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241508783.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243942870.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241924169.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242265504.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241318656.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.244093097.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.243557493.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.241016314.000000000613B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242425287.000000000613B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.founder.com.cn/cna-diDN8slYDJr3.exe, 00000000.00000003.242745769.0000000006127000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.commVDN8slYDJr3.exe, 00000000.00000003.285353913.0000000006120000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.257046421.000000000612A000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000002.296409775.0000000006120000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/DN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comdDN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://en.wDN8slYDJr3.exe, 00000000.00000003.241072805.0000000006126000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.coma3DN8slYDJr3.exe, 00000000.00000003.285353913.0000000006120000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.257046421.000000000612A000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000002.296409775.0000000006120000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.founder.com.cn/cnDN8slYDJr3.exe, 00000000.00000003.242899291.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.242745769.0000000006127000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-jones.htmlDN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8DN8slYDJr3.exe, 00000000.00000002.296539257.0000000007332000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.comituVDN8slYDJr3.exe, 00000000.00000003.250839452.0000000006128000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.250397967.0000000006127000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/dDN8slYDJr3.exe, 00000000.00000003.245158910.000000000612B000.00000004.00000800.00020000.00000000.sdmp, DN8slYDJr3.exe, 00000000.00000003.245071450.000000000612B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            109.248.150.171
                            mallow.3utilities.comRussian Federation
                            52048DATACLUBLVtrue
                            IP
                            192.168.2.1
                            Joe Sandbox Version:34.0.0 Boulder Opal
                            Analysis ID:626765
                            Start date and time: 15/05/202205:53:172022-05-15 05:53:17 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 8m 4s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:DN8slYDJr3.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:34
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@9/12@17/2
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:
                            • Successful, ratio: 0.1% (good quality ratio 0.1%)
                            • Quality average: 60.1%
                            • Quality standard deviation: 38.5%
                            HCA Information:
                            • Successful, ratio: 88%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Adjust boot time
                            • Enable AMSI
                            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                            • TCP Packets have been reduced to 100
                            • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, UsoClient.exe, wuapihost.exe
                            • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, go.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            05:55:14API Interceptor1x Sleep call for process: DN8slYDJr3.exe modified
                            05:55:23API Interceptor40x Sleep call for process: powershell.exe modified
                            05:55:28API Interceptor844x Sleep call for process: RegSvcs.exe modified
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\DN8slYDJr3.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:modified
                            Size (bytes):1308
                            Entropy (8bit):5.345811588615766
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4FsXE8:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHJ
                            MD5:EA78C102145ED608EF0E407B978AF339
                            SHA1:66C9179ED9675B9271A97AB1FC878077E09AB731
                            SHA-256:8BF01E0C445BD07C0B4EDC7199B7E17DAF1CA55CA52D4A6EAC4EF211C2B1A73E
                            SHA-512:8C04139A1FC3C3BDACB680EC443615A43EB18E73B5A0CFCA644CB4A5E71746B275B3E238DD1A5A205405313E457BB75F9BBB93277C67AFA5D78DCFA30E5DA02B
                            Malicious:true
                            Reputation:moderate, very likely benign file
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):22272
                            Entropy (8bit):5.6012805385595374
                            Encrypted:false
                            SSDEEP:384:3tMjDsh0mVQr5S7m3eOYSBKnwjultI+b7Y9gcSJ3xOT1MR7ZlbAV7gBwKZBDI+iB:GUQ5kwY4KwClth7ccUChfwcVo
                            MD5:4D79D8CB401FDFC04F9E03CA87ED2C7A
                            SHA1:821F58E4D01AFC06AE97561C1C184CDB65FD6692
                            SHA-256:A2024CA244F691E72EA043DBCD704DA31F9AF33AD673FA181271AD7762D1B6AE
                            SHA-512:93B187C634803B41B072E69777CB7439C30B7E7FC3D9C6D0C1043B378408D43B21963928480B015291A2F20606966B2866ADDF1D81A9EA4EB56B2F0875C28580
                            Malicious:false
                            Reputation:low
                            Preview:@...e...........y.......h.".E.<.9.........I..........@..........H...............<@.^.L."My...:X..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.4................Zg5..:O..g..q..........System.Xml..@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Users\user\Desktop\DN8slYDJr3.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1600
                            Entropy (8bit):5.159339618769527
                            Encrypted:false
                            SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNt9xvn:cge4MYrFdOFzOzN33ODOiDdKrsuTDv
                            MD5:5D6452ACB55BD8182F9E3BEE2FDA460D
                            SHA1:27AD05A72FCC6E63D3AB0AFAF614D7AC5F8A78B7
                            SHA-256:ACE22EF71978C4709786CAF11262D33D5C7E6E4ED2E8609315333321900803DA
                            SHA-512:0F19187CFC9331F373412EA98D7C467C762B11F9211B02A4F2DA0296A1AA2E9866923A5994687CCBB74249D1A912F88610959F3D0CB7F03CF9BACF5D93791733
                            Malicious:true
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):232
                            Entropy (8bit):7.024371743172393
                            Encrypted:false
                            SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                            MD5:32D0AAE13696FF7F8AF33B2D22451028
                            SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                            SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                            SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                            Malicious:false
                            Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):8
                            Entropy (8bit):3.0
                            Encrypted:false
                            SSDEEP:3:Vs:G
                            MD5:D6C06BC5AAD8EF66419EDE04C8C3E9D1
                            SHA1:8C188D1109D036BA2C7B7801AC0A74CF00077D37
                            SHA-256:AA56215F55E0D18F8793F6EC5B4390EF8324856B27479B4E57A26908D75BFB12
                            SHA-512:F2794281A41F7C7942A3EAFECD3C1A541D8EDB2484A988B75B1B8A7FAED80B91B604AF3CFA4380CB155ABEB3114BBBA6CDB9A3018F41AA8BD6E37C9E884D6147
                            Malicious:true
                            Preview:.U./r6.H
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):40
                            Entropy (8bit):5.153055907333276
                            Encrypted:false
                            SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                            MD5:4E5E92E2369688041CC82EF9650EDED2
                            SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                            SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                            SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                            Malicious:false
                            Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):327928
                            Entropy (8bit):7.9994709860950985
                            Encrypted:true
                            SSDEEP:6144:EV615H8mrxOdiCllSG0fG4DWvsN24t17uyyHAg5TGbgQYZ3CifoqiI9FQvLib8:4615cmrx8fSHfG0Wvs71yHAgRGgzV5K5
                            MD5:FAFF7BD1824C990ACE96C5385AE54073
                            SHA1:2C14D468D0C8116B448E65D791D3409DC254785D
                            SHA-256:1120219B5C6646F6A910CE2A556385DCA8F6C551D0FB05F719D07FE2061932AA
                            SHA-512:C5D48611DD5BA55A998C94FD5245BA7FA78F351F0677990F0512CFC2B803310C9B07EFA77A9ABE2FF4ECA25DE054E0860EEB6C89E022BC7689665C42BACCC7D5
                            Malicious:false
                            Preview:..,!..LJy..5<...9....!..?.AJ.._l..Px.9g..._t...].....t../...a.k.Z3.H...o..>.6.x.E.....hBu*.#.Z..v..).#..x...hI..e...B-<.J0...o...]....%......51.h..G{.u.|*r..xs.d..#....).&.e.3..6.V+....d......!..v...)Y......pe...c.mW.....O.X...>.[......w^.0.&Z.^5se.(..1 Zq.....G.`y.F.f..T[k.^.fj.o.~...t.=..[...zU8_..b...%......J.6._..._!{.c... .8...^........^.,|...7T.c.._X/n..Fd.M>.=..Cmwd.%N.S.-..jk!.B.q>S...7.h....?sa.S@..3...G.B.M..Q.f..b....j..0y.i&..$...LIq}&..8F.........m........=..5O.g...}"4......z.q.b.Am.A1."]".....C..F..9.2.u.DL..s.=^.s.@..k.c>.u...rw.W.E....Jn..........$...C...0../.l.M...D._.K.d.2...|...T....1.....g.-x.........U$.I.n...e..|J...AVU.v.I..3.7%&.6.......)....@f......}TR...g]W8x..."...{.H.....gS,..@.).......L...K7.'V.42...~.b..q.j.V.1...V..`.NW*].l6A...c.<..5..'..u...i...*...L..'..!.cD..m...3~....As.@+....'&..\4_...6..t.jq2IK.K.2..E&.K..wi9...enm.7...0.EVG.Ab....S...(%.of.b.?.J..;."0....0u.%.M....(a...A.LEn....P.z.x.3.8....G.....MT.:
                            Process:C:\Users\user\Desktop\DN8slYDJr3.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):884736
                            Entropy (8bit):7.874267720295541
                            Encrypted:false
                            SSDEEP:24576:p7DOlquevT6sh7g2781m7U+0aGmBwlt3prONe:p7D8Dev2Mg+IgUoG7lt3Ae
                            MD5:A6FE8903E741154BC80352D0EE73EFFF
                            SHA1:772E00C83EEAE03EA4C7433F737B8D6A1D8B967E
                            SHA-256:63AD21733D5E1DB06FAA9C863422889AE1F185116E02B45A50259E286EE42E50
                            SHA-512:1C984A4E72726E2EE01D5A0F14D5E4DB66B72C5B1F5C087CB3599B7FAC2AF726992CDACC2302B4830383B13CC0861E41F36A7A054C4690A25A0404ECE060761B
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 63%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z|b..............0.. ...@.......#... ...@....@.. ... ....................... ........@.................................."..O....@.......................`......|!............................................... ............... ..H............text........ ... ... .............. ..`.rsrc........@... ...@..............@..@.reloc.......`... ...`..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\DN8slYDJr3.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):5801
                            Entropy (8bit):5.433137009420185
                            Encrypted:false
                            SSDEEP:96:BZYh8NEqDo1ZnZih8NEqDo1ZN4GQjZzh8NEqDo1Zid5ggJZ6:Nq
                            MD5:32B4DF8F09E0D13DD9F54D51916A0C88
                            SHA1:7C7DCA62D7E5235D69F3CA1E56C84EF60D36592C
                            SHA-256:35376FA680A3616E5FEDAC3D0AA1F5908BF36E820872317620C27ED1B54FA126
                            SHA-512:4C70233BEFD8BB93FE71B7EBB142E1FE6C9246CBAC5B4D00F01E9CD9CF43B3BA2821167D9EBDAE60BE942ED659B789E5529230F9918E7DC7BFD9101F97504298
                            Malicious:false
                            Preview:.**********************..Windows PowerShell transcript start..Start time: 20220515055522..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 347688 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\IulEJNIqTKEFv.exe..Process ID: 6788..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220515055522..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\IulEJNIqTKEFv.exe..**********************..Windows PowerShell transcript start..Start time: 20220515055902..Username: computer\user..RunAs User: DESKTOP-716T77
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.874267720295541
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Win16/32 Executable Delphi generic (2074/23) 0.01%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            File name:DN8slYDJr3.exe
                            File size:884736
                            MD5:a6fe8903e741154bc80352d0ee73efff
                            SHA1:772e00c83eeae03ea4c7433f737b8d6a1d8b967e
                            SHA256:63ad21733d5e1db06faa9c863422889ae1f185116e02b45a50259e286ee42e50
                            SHA512:1c984a4e72726e2ee01d5a0f14d5e4db66b72c5b1f5c087cb3599b7fac2af726992cdacc2302b4830383b13cc0861e41f36a7a054c4690a25a0404ece060761b
                            SSDEEP:24576:p7DOlquevT6sh7g2781m7U+0aGmBwlt3prONe:p7D8Dev2Mg+IgUoG7lt3Ae
                            TLSH:65152338272C2336E81BC7B6CF00E3DDA7B87DA41D00E60F5D9879CCA675B45869256B
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z|b..............0.. ...@.......#... ...@....@.. ... ....................... ........@................................
                            Icon Hash:00828e8e8686b000
                            Entrypoint:0x4d2306
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                            Time Stamp:0x627C5AB0 [Thu May 12 00:54:08 2022 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:v4.0.30319
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xd22b40x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x5f4.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xd60000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0xd217c0x1c.text
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xd030c0xd2000False0.964989071801data7.95859467732IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                            .rsrc0xd40000x5f40x2000False0.0838623046875data1.09899540351IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0xd60000xc0x2000False0.0050048828125data0.00881485270734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountry
                            RT_VERSION0xd40900x364data
                            RT_MANIFEST0xd44040x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                            DLLImport
                            mscoree.dll_CorExeMain
                            DescriptionData
                            Translation0x0000 0x04b0
                            LegalCopyrightCopyright 2013
                            Assembly Version0.0.1.0
                            InternalNameDynamicAssemblyFl.exe
                            FileVersion0.0.1.0
                            CompanyName
                            LegalTrademarks
                            Comments
                            ProductNamePagedOptionsDialog
                            ProductVersion0.0.1.0
                            FileDescriptionPagedOptionsDialog
                            OriginalFilenameDynamicAssemblyFl.exe
                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            192.168.2.3109.248.150.17149771832816766 05/15/22-05:56:07.894508TCP2816766ETPRO TROJAN NanoCore RAT CnC 74977183192.168.2.3109.248.150.171
                            109.248.150.171192.168.2.383497542841753 05/15/22-05:55:28.352765TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)8349754109.248.150.171192.168.2.3
                            109.248.150.171192.168.2.383497452841753 05/15/22-05:54:57.696804TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)8349745109.248.150.171192.168.2.3
                            109.248.150.171192.168.2.383497492841753 05/15/22-05:55:02.792533TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)8349749109.248.150.171192.168.2.3
                            192.168.2.3109.248.150.17149738832816766 05/15/22-05:54:43.813398TCP2816766ETPRO TROJAN NanoCore RAT CnC 74973883192.168.2.3109.248.150.171
                            192.168.2.3109.248.150.17149751832816766 05/15/22-05:55:09.867717TCP2816766ETPRO TROJAN NanoCore RAT CnC 74975183192.168.2.3109.248.150.171
                            109.248.150.171192.168.2.383497582841753 05/15/22-05:55:39.462032TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)8349758109.248.150.171192.168.2.3
                            192.168.2.3109.248.150.17149743832816766 05/15/22-05:54:52.689575TCP2816766ETPRO TROJAN NanoCore RAT CnC 74974383192.168.2.3109.248.150.171
                            192.168.2.3109.248.150.17149770832816766 05/15/22-05:55:59.950651TCP2816766ETPRO TROJAN NanoCore RAT CnC 74977083192.168.2.3109.248.150.171
                            192.168.2.3109.248.150.17149752832816766 05/15/22-05:55:15.941176TCP2816766ETPRO TROJAN NanoCore RAT CnC 74975283192.168.2.3109.248.150.171
                            109.248.150.171192.168.2.383497692841753 05/15/22-05:55:51.676335TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)8349769109.248.150.171192.168.2.3
                            192.168.2.3109.248.150.17149753832816766 05/15/22-05:55:21.968753TCP2816766ETPRO TROJAN NanoCore RAT CnC 74975383192.168.2.3109.248.150.171
                            109.248.150.171192.168.2.383498022841753 05/15/22-05:56:18.173297TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)8349802109.248.150.171192.168.2.3
                            109.248.150.171192.168.2.383497782841753 05/15/22-05:56:13.009421TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)8349778109.248.150.171192.168.2.3
                            192.168.2.3109.248.150.17149757832816766 05/15/22-05:55:34.302368TCP2816766ETPRO TROJAN NanoCore RAT CnC 74975783192.168.2.3109.248.150.171
                            109.248.150.171192.168.2.383498202841753 05/15/22-05:56:28.052052TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)8349820109.248.150.171192.168.2.3
                            192.168.2.3109.248.150.17149767832816766 05/15/22-05:55:46.492067TCP2816766ETPRO TROJAN NanoCore RAT CnC 74976783192.168.2.3109.248.150.171
                            TimestampSource PortDest PortSource IPDest IP
                            May 15, 2022 05:54:42.494297028 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:42.522737980 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:42.522900105 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:42.603166103 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:42.680036068 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:42.827708006 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:42.905734062 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:43.707685947 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:43.723180056 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:43.751591921 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:43.813397884 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:43.898201942 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.023403883 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.059678078 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.059747934 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.059787035 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.059815884 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.059825897 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.059866905 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.059906960 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.059912920 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.059947968 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.059961081 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.059988976 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.060029030 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.060069084 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.060075998 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.060488939 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.087606907 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.087675095 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.087713957 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.087754011 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.087752104 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.087794065 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.087805986 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.087836027 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.087877989 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.087903976 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.087915897 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.087958097 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.087997913 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.088011026 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.088037968 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.088080883 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.088093042 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.088123083 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.088162899 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.088181973 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.088205099 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.088243961 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.088275909 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.088285923 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.088303089 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.088326931 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.090013027 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.090070963 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.090104103 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.090130091 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.115858078 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.115926027 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116087914 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116133928 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116174936 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116214037 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116252899 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116292000 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116333961 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116378069 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116416931 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116457939 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116533041 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116575956 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116609097 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.116615057 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116652012 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.116657019 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116697073 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116728067 CEST8349738109.248.150.171192.168.2.3
                            May 15, 2022 05:54:44.116761923 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.116796017 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:44.958950996 CEST4973883192.168.2.3109.248.150.171
                            May 15, 2022 05:54:50.035624027 CEST4974383192.168.2.3109.248.150.171
                            May 15, 2022 05:54:50.063533068 CEST8349743109.248.150.171192.168.2.3
                            May 15, 2022 05:54:50.063818932 CEST4974383192.168.2.3109.248.150.171
                            May 15, 2022 05:54:50.183475018 CEST4974383192.168.2.3109.248.150.171
                            May 15, 2022 05:54:50.257505894 CEST8349743109.248.150.171192.168.2.3
                            May 15, 2022 05:54:50.326814890 CEST8349743109.248.150.171192.168.2.3
                            May 15, 2022 05:54:50.373653889 CEST4974383192.168.2.3109.248.150.171
                            May 15, 2022 05:54:51.360863924 CEST4974383192.168.2.3109.248.150.171
                            May 15, 2022 05:54:51.425935984 CEST8349743109.248.150.171192.168.2.3
                            May 15, 2022 05:54:51.510365009 CEST4974383192.168.2.3109.248.150.171
                            May 15, 2022 05:54:51.576093912 CEST4974383192.168.2.3109.248.150.171
                            May 15, 2022 05:54:51.644898891 CEST8349743109.248.150.171192.168.2.3
                            May 15, 2022 05:54:51.777121067 CEST4974383192.168.2.3109.248.150.171
                            May 15, 2022 05:54:51.867172003 CEST8349743109.248.150.171192.168.2.3
                            May 15, 2022 05:54:51.974879980 CEST8349743109.248.150.171192.168.2.3
                            May 15, 2022 05:54:52.040430069 CEST4974383192.168.2.3109.248.150.171
                            May 15, 2022 05:54:52.068775892 CEST8349743109.248.150.171192.168.2.3
                            May 15, 2022 05:54:52.112411976 CEST4974383192.168.2.3109.248.150.171
                            May 15, 2022 05:54:52.183248997 CEST8349743109.248.150.171192.168.2.3
                            TimestampSource PortDest PortSource IPDest IP
                            May 15, 2022 05:54:42.462292910 CEST5785153192.168.2.38.8.8.8
                            May 15, 2022 05:54:42.482404947 CEST53578518.8.8.8192.168.2.3
                            May 15, 2022 05:54:50.014200926 CEST4931653192.168.2.38.8.8.8
                            May 15, 2022 05:54:50.034410954 CEST53493168.8.8.8192.168.2.3
                            May 15, 2022 05:54:57.621617079 CEST5641753192.168.2.38.8.8.8
                            May 15, 2022 05:54:57.638111115 CEST53564178.8.8.8192.168.2.3
                            May 15, 2022 05:55:02.713583946 CEST5772353192.168.2.38.8.8.8
                            May 15, 2022 05:55:02.731678009 CEST53577238.8.8.8192.168.2.3
                            May 15, 2022 05:55:07.622051001 CEST5742153192.168.2.38.8.8.8
                            May 15, 2022 05:55:07.638731003 CEST53574218.8.8.8192.168.2.3
                            May 15, 2022 05:55:14.887804031 CEST6535853192.168.2.38.8.8.8
                            May 15, 2022 05:55:14.906346083 CEST53653588.8.8.8192.168.2.3
                            May 15, 2022 05:55:21.222600937 CEST4987353192.168.2.38.8.8.8
                            May 15, 2022 05:55:21.241132021 CEST53498738.8.8.8192.168.2.3
                            May 15, 2022 05:55:28.258460045 CEST5380253192.168.2.38.8.8.8
                            May 15, 2022 05:55:28.278736115 CEST53538028.8.8.8192.168.2.3
                            May 15, 2022 05:55:33.341849089 CEST6333253192.168.2.38.8.8.8
                            May 15, 2022 05:55:33.359914064 CEST53633328.8.8.8192.168.2.3
                            May 15, 2022 05:55:39.376532078 CEST6354853192.168.2.38.8.8.8
                            May 15, 2022 05:55:39.396401882 CEST53635488.8.8.8192.168.2.3
                            May 15, 2022 05:55:44.618705988 CEST6138053192.168.2.38.8.8.8
                            May 15, 2022 05:55:44.635627031 CEST53613808.8.8.8192.168.2.3
                            May 15, 2022 05:55:51.591789007 CEST6314653192.168.2.38.8.8.8
                            May 15, 2022 05:55:51.610121012 CEST53631468.8.8.8192.168.2.3
                            May 15, 2022 05:55:57.830147028 CEST5298553192.168.2.38.8.8.8
                            May 15, 2022 05:55:57.848510981 CEST53529858.8.8.8192.168.2.3
                            May 15, 2022 05:56:06.463772058 CEST5862553192.168.2.38.8.8.8
                            May 15, 2022 05:56:06.484291077 CEST53586258.8.8.8192.168.2.3
                            May 15, 2022 05:56:12.925609112 CEST5939053192.168.2.38.8.8.8
                            May 15, 2022 05:56:12.943950891 CEST53593908.8.8.8192.168.2.3
                            May 15, 2022 05:56:18.048286915 CEST5015253192.168.2.38.8.8.8
                            May 15, 2022 05:56:18.066441059 CEST53501528.8.8.8192.168.2.3
                            May 15, 2022 05:56:22.961030006 CEST5496053192.168.2.38.8.8.8
                            May 15, 2022 05:56:22.977479935 CEST53549608.8.8.8192.168.2.3
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                            May 15, 2022 05:54:42.462292910 CEST192.168.2.38.8.8.80xe2e6Standard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:54:50.014200926 CEST192.168.2.38.8.8.80xec48Standard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:54:57.621617079 CEST192.168.2.38.8.8.80x3669Standard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:55:02.713583946 CEST192.168.2.38.8.8.80xa052Standard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:55:07.622051001 CEST192.168.2.38.8.8.80xe481Standard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:55:14.887804031 CEST192.168.2.38.8.8.80x2fa2Standard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:55:21.222600937 CEST192.168.2.38.8.8.80xc35dStandard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:55:28.258460045 CEST192.168.2.38.8.8.80x15f4Standard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:55:33.341849089 CEST192.168.2.38.8.8.80x976fStandard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:55:39.376532078 CEST192.168.2.38.8.8.80x1771Standard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:55:44.618705988 CEST192.168.2.38.8.8.80x713Standard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:55:51.591789007 CEST192.168.2.38.8.8.80xd62eStandard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:55:57.830147028 CEST192.168.2.38.8.8.80xf8c2Standard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:56:06.463772058 CEST192.168.2.38.8.8.80xbf8fStandard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:56:12.925609112 CEST192.168.2.38.8.8.80xded1Standard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:56:18.048286915 CEST192.168.2.38.8.8.80x8431Standard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            May 15, 2022 05:56:22.961030006 CEST192.168.2.38.8.8.80xdecdStandard query (0)mallow.3utilities.comA (IP address)IN (0x0001)
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                            May 15, 2022 05:54:42.482404947 CEST8.8.8.8192.168.2.30xe2e6No error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:54:50.034410954 CEST8.8.8.8192.168.2.30xec48No error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:54:57.638111115 CEST8.8.8.8192.168.2.30x3669No error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:55:02.731678009 CEST8.8.8.8192.168.2.30xa052No error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:55:07.638731003 CEST8.8.8.8192.168.2.30xe481No error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:55:14.906346083 CEST8.8.8.8192.168.2.30x2fa2No error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:55:21.241132021 CEST8.8.8.8192.168.2.30xc35dNo error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:55:28.278736115 CEST8.8.8.8192.168.2.30x15f4No error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:55:33.359914064 CEST8.8.8.8192.168.2.30x976fNo error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:55:39.396401882 CEST8.8.8.8192.168.2.30x1771No error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:55:44.635627031 CEST8.8.8.8192.168.2.30x713No error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:55:51.610121012 CEST8.8.8.8192.168.2.30xd62eNo error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:55:57.848510981 CEST8.8.8.8192.168.2.30xf8c2No error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:56:06.484291077 CEST8.8.8.8192.168.2.30xbf8fNo error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:56:12.943950891 CEST8.8.8.8192.168.2.30xded1No error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:56:18.066441059 CEST8.8.8.8192.168.2.30x8431No error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)
                            May 15, 2022 05:56:22.977479935 CEST8.8.8.8192.168.2.30xdecdNo error (0)mallow.3utilities.com109.248.150.171A (IP address)IN (0x0001)

                            Click to jump to process

                            Target ID:0
                            Start time:05:55:03
                            Start date:15/05/2022
                            Path:C:\Users\user\Desktop\DN8slYDJr3.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\DN8slYDJr3.exe"
                            Imagebase:0xdc0000
                            File size:884736 bytes
                            MD5 hash:A6FE8903E741154BC80352D0EE73EFFF
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.289573778.0000000004171000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.289573778.0000000004171000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.289573778.0000000004171000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.294913817.00000000046FF000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.294913817.00000000046FF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.294913817.00000000046FF000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.287530312.0000000003171000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low

                            Target ID:4
                            Start time:05:55:17
                            Start date:15/05/2022
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IulEJNIqTKEFv.exe
                            Imagebase:0x8c0000
                            File size:430592 bytes
                            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Reputation:high

                            Target ID:5
                            Start time:05:55:18
                            Start date:15/05/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7c9170000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:6
                            Start time:05:55:18
                            Start date:15/05/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IulEJNIqTKEFv" /XML "C:\Users\user\AppData\Local\Temp\tmp2ADE.tmp
                            Imagebase:0xc0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:7
                            Start time:05:55:21
                            Start date:15/05/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7c9170000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:8
                            Start time:05:55:23
                            Start date:15/05/2022
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            Imagebase:0xfb0000
                            File size:45152 bytes
                            MD5 hash:2867A3817C9245F7CF518524DFD18F28
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.283747964.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.283747964.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.283747964.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.282381940.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.282381940.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.282381940.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.284049855.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.284049855.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.284049855.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.283054100.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.283054100.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.283054100.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:high

                            No disassembly