Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
s0VxndYXq0

Overview

General Information

Sample Name:s0VxndYXq0 (renamed file extension from none to exe)
Analysis ID:679299
MD5:de9784a4f56eaf8affc96754a15a5cd3
SHA1:35c361a8bfdb894e80fe99728e60ad7d08745af1
SHA256:f384a96582763be490ea4eeed6d3f10291d7df964f64db077b4d10697149a7da
Tags:exe
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected Remcos RAT
Antivirus / Scanner detection for submitted sample
Detected Remcos RAT
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Uses ping.exe to check the status of other devices and networks
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Uses ping.exe to sleep
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • s0VxndYXq0.exe (PID: 2732 cmdline: "C:\Users\user\Desktop\s0VxndYXq0.exe" MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
    • s0VxndYXq0.exe (PID: 3264 cmdline: C:\Users\user\Desktop\s0VxndYXq0.exe MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
      • cmd.exe (PID: 3704 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\install.bat" " MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 3708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • PING.EXE (PID: 5088 cmdline: PING 127.0.0.1 -n 2 MD5: 70C24A306F768936563ABDADB9CA9108)
        • remcos.exe (PID: 3908 cmdline: "C:\Users\user\remcos\remcos.exe" MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
          • remcos.exe (PID: 1924 cmdline: C:\Users\user\remcos\remcos.exe MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
          • remcos.exe (PID: 5456 cmdline: C:\Users\user\remcos\remcos.exe MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
          • remcos.exe (PID: 3572 cmdline: C:\Users\user\remcos\remcos.exe MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
  • remcos.exe (PID: 5540 cmdline: "C:\Users\user\remcos\remcos.exe" MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
    • remcos.exe (PID: 5580 cmdline: C:\Users\user\remcos\remcos.exe MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
  • remcos.exe (PID: 4776 cmdline: "C:\Users\user\remcos\remcos.exe" MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
    • remcos.exe (PID: 5832 cmdline: C:\Users\user\remcos\remcos.exe MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
  • cleanup
{"Host:Port:Password": "79.134.225.97:8600:123456|", "Assigned name": "Host", "Connect interval": "5", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "User Profile", "Copy file": "remcos.exe", "Startup value": "remcos", "Hide file": "Disable", "Mutex": "remcos_totevzugmgbhhbj", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screens", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "audio", "Connect delay": "0", "Copy folder": "remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
s0VxndYXq0.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\remcos\remcos.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmpRemcosdetect Remcos in memoryJPCERT/CC Incident Response Group
        • 0x1afb8:$remcos: Remcos
        • 0x1b82c:$remcos: Remcos
        • 0x1b864:$url: Breaking-Security.Net
        • 0x20086:$resource: SETTINGS
        00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpRemcosdetect Remcos in memoryJPCERT/CC Incident Response Group
            • 0x72b64:$remcos: Remcos
            • 0x733d8:$remcos: Remcos
            • 0x73410:$url: Breaking-Security.Net
            • 0x77c32:$resource: SETTINGS
            Click to see the 19 entries
            SourceRuleDescriptionAuthorStrings
            0.2.s0VxndYXq0.exe.452e400.8.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              0.2.s0VxndYXq0.exe.452e400.8.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
              • 0x10738:$s1: \Classes\mscfile\shell\open\command
              • 0x10720:$s2: eventvwr.exe
              0.2.s0VxndYXq0.exe.452e400.8.unpackRemcos_1Remcos Payloadkevoreilly
              • 0x11034:$name: Remcos
              • 0x118a8:$name: Remcos
              • 0x118fb:$name: REMCOS
              • 0x10688:$time: %02i:%02i:%02i:%03i
              • 0x11320:$time: %02i:%02i:%02i:%03i
              • 0x29fc:$crypto: 0F B6 96 08 04 00 00 89 10 8B 45 08 8D 34 07 8B 01 03 C2 8B CB 99 F7 F9 8A 84 95 F4 FB FF FF 30 06 47 3B 7D 0C 72
              0.2.s0VxndYXq0.exe.452e400.8.unpackRemcosdetect Remcos in memoryJPCERT/CC Incident Response Group
              • 0x11034:$remcos: Remcos
              • 0x118a8:$remcos: Remcos
              • 0x118e0:$url: Breaking-Security.Net
              • 0x160ea:$resource: SETTINGS
              0.2.s0VxndYXq0.exe.452e400.8.unpackREMCOS_RAT_variantsunknownunknown
              • 0x114dc:$funcs1: autogetofflinelogs
              • 0x114c0:$funcs2: clearlogins
              • 0x114f0:$funcs3: getofflinelogs
              • 0x11578:$funcs4: execcom
              • 0x114cc:$funcs5: deletekeylog
              • 0x11798:$funcs6: remscriptexecd
              • 0x115bc:$funcs7: getwindows
              • 0x10da0:$funcs8: fundlldata
              • 0x10d78:$funcs9: getfunlib
              • 0x107ec:$funcs10: autofflinelogs
              • 0x113b8:$funcs11: getclipboard
              • 0x114b4:$funcs12: getscrslist
              • 0x107e0:$funcs13: offlinelogs
              • 0x105c8:$funcs14: getcamsingleframe
              • 0x116e4:$funcs15: listfiles
              • 0x115e0:$funcs16: getproclist
              • 0x10828:$funcs17: onlinelogs
              • 0x11700:$funcs18: getdrives
              • 0x11784:$funcs19: remscriptsuccess
              • 0x10600:$funcs20: getcamframe
              • 0x1115c:$str_a1: C:\Windows\System32\cmd.exe
              Click to see the 56 entries
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: s0VxndYXq0.exeVirustotal: Detection: 53%Perma Link
              Source: s0VxndYXq0.exeReversingLabs: Detection: 53%
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001C.00000002.365233653.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.342391067.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.269857625.0000000002CD0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000002.493007691.00000000029B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 2732, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 3264, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3908, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5540, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3572, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5580, type: MEMORYSTR
              Source: s0VxndYXq0.exeAvira: detected
              Source: C:\Users\user\remcos\remcos.exeAvira: detection malicious, Label: TR/Kryptik.wodao
              Source: C:\Users\user\remcos\remcos.exeReversingLabs: Detection: 53%
              Source: s0VxndYXq0.exeJoe Sandbox ML: detected
              Source: C:\Users\user\remcos\remcos.exeJoe Sandbox ML: detected
              Source: 0000001C.00000002.365233653.0000000000DF0000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "79.134.225.97:8600:123456|", "Assigned name": "Host", "Connect interval": "5", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "User Profile", "Copy file": "remcos.exe", "Startup value": "remcos", "Hide file": "Disable", "Mutex": "remcos_totevzugmgbhhbj", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screens", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "audio", "Connect delay": "0", "Copy folder": "remcos", "Keylog folder": "remcos"}
              Source: s0VxndYXq0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: s0VxndYXq0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE PING 127.0.0.1 -n 2
              Source: Yara matchFile source: s0VxndYXq0.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.s0VxndYXq0.exe.550000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: C:\Users\user\remcos\remcos.exe, type: DROPPED
              Source: Malware configuration extractorURLs: 79.134.225.97
              Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
              Source: Joe Sandbox ViewIP Address: 79.134.225.97 79.134.225.97
              Source: global trafficTCP traffic: 192.168.2.4:49765 -> 79.134.225.97:8600
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: s0VxndYXq0.exe, remcos.exe.5.drString found in binary or memory: http://bit.ly/unCoIY?http://lolnotes-
              Source: s0VxndYXq0.exe, remcos.exe.5.drString found in binary or memory: http://bladecoding.com/lolnotes/leagueofstats.php?name=
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
              Source: s0VxndYXq0.exe, 00000000.00000003.243809889.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243932808.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243586194.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244127013.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244021936.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243771965.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243848246.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244328823.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244234942.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.249288953.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.274138797.0000000005B2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agfamonotype.cw
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.274032296.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.264248405.0000000005AEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
              Source: s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com.TTF
              Source: s0VxndYXq0.exe, 00000000.00000003.237525657.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238027244.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237981073.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238107631.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238027244.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238027244.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
              Source: s0VxndYXq0.exe, 00000000.00000003.237791179.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237771360.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237819421.0000000005B1E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersF
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
              Source: s0VxndYXq0.exe, 00000000.00000003.237710320.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersP
              Source: s0VxndYXq0.exe, 00000000.00000003.238476266.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238443260.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersa
              Source: s0VxndYXq0.exe, 00000000.00000003.244079552.0000000005B1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerse
              Source: s0VxndYXq0.exe, 00000000.00000003.237791179.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237910949.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237771360.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237851832.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237819421.0000000005B1E000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237952730.0000000005B1E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerses-es_tradnlw
              Source: s0VxndYXq0.exe, 00000000.00000003.244112658.0000000005B1C000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244079552.0000000005B1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerst
              Source: s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com7
              Source: s0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
              Source: s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsF
              Source: s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsR
              Source: s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsk
              Source: s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
              Source: s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessed
              Source: s0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comictav
              Source: s0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
              Source: s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
              Source: s0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/%
              Source: s0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y
              Source: s0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
              Source: s0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/l-g
              Source: s0VxndYXq0.exe, remcos.exe.5.drString found in binary or memory: http://www.lolking.net/summoner/
              Source: s0VxndYXq0.exe, 00000000.00000003.237033632.0000000005B1E000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237070417.0000000005B20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.Wb
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
              Source: s0VxndYXq0.exe, remcos.exe.5.drString found in binary or memory: https://github.com/high6/LoLNotes
              Source: s0VxndYXq0.exe, remcos.exe.5.drString found in binary or memory: https://raw.github.com/bladecoding/LoLNotes/master/General.txtO
              Source: remcos.exe, 00000009.00000002.322144849.0000000000D1B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001C.00000002.365233653.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.342391067.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.269857625.0000000002CD0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000002.493007691.00000000029B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 2732, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 3264, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3908, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5540, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3572, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5580, type: MEMORYSTR

              System Summary

              barindex
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: s0VxndYXq0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: Process Memory Space: remcos.exe PID: 3908, type: MEMORYSTRMatched rule: webshell_jsp_generic_base64 date = 2021/01/24, author = Arnim Rupp, description = Generic JSP webshell with base64 encoded payload, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 1b916afdd415dfa4e77cecf47321fd676ba2184d
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeCode function: 0_2_029DE4FC
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeCode function: 0_2_075A53C0
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeCode function: 0_2_075A6988
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeCode function: 0_2_075AA3B8
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeCode function: 0_2_075A53B0
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_00F8E4FC
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_07006988
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_070053C0
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0700A3B8
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_070053B0
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0ADCC078
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0ADCC6E0
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0ADC21F0
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0ADC21E1
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0AEE7AA0
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0AEE0040
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0AEE0039
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0AEE8CF0
              Source: s0VxndYXq0.exe, 00000000.00000002.276887769.00000000075C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamePlates.dll4 vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exe, 00000000.00000002.267398551.0000000002ACF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exe, 00000000.00000002.267211444.0000000002A71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFroor.dll4 vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exe, 00000000.00000003.253119443.00000000088CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePlates.dll4 vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exe, 00000000.00000000.224015352.0000000000552000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameChannelServicesD.exe2 vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exe, 00000000.00000002.278244309.000000000B4F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSchedulingClerk.dll. vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exe, 00000000.00000002.268898105.0000000004279000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSchedulingClerk.dll. vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exe, 00000005.00000003.263421070.000000000111B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameChannelServicesD.exe2 vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exeBinary or memory string: OriginalFilenameChannelServicesD.exe2 vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: remcos.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: s0VxndYXq0.exeVirustotal: Detection: 53%
              Source: s0VxndYXq0.exeReversingLabs: Detection: 53%
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeFile read: C:\Users\user\Desktop\s0VxndYXq0.exeJump to behavior
              Source: s0VxndYXq0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\s0VxndYXq0.exe "C:\Users\user\Desktop\s0VxndYXq0.exe"
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess created: C:\Users\user\Desktop\s0VxndYXq0.exe C:\Users\user\Desktop\s0VxndYXq0.exe
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\install.bat" "
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE PING 127.0.0.1 -n 2
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\remcos\remcos.exe "C:\Users\user\remcos\remcos.exe"
              Source: unknownProcess created: C:\Users\user\remcos\remcos.exe "C:\Users\user\remcos\remcos.exe"
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: unknownProcess created: C:\Users\user\remcos\remcos.exe "C:\Users\user\remcos\remcos.exe"
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess created: C:\Users\user\Desktop\s0VxndYXq0.exe C:\Users\user\Desktop\s0VxndYXq0.exe
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\install.bat" "
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE PING 127.0.0.1 -n 2
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\remcos\remcos.exe "C:\Users\user\remcos\remcos.exe"
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8856F961-340A-11D0-A96B-00C04FD705A2}\InProcServer32
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\s0VxndYXq0.exe.logJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeFile created: C:\Users\user\AppData\Local\Temp\install.batJump to behavior
              Source: classification engineClassification label: mal100.troj.evad.winEXE@23/5@0/2
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: s0VxndYXq0.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\remcos\remcos.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\remcos\remcos.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\remcos\remcos.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\remcos\remcos.exeMutant created: \Sessions\1\BaseNamedObjects\remcos_totevzugmgbhhbj
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3708:120:WilError_01
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\install.bat" "
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
              Source: s0VxndYXq0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: s0VxndYXq0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_07004C20 pushfd ; iretd
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0ADC5FAC push edx; ret
              Source: initial sampleStatic PE information: section name: .text entropy: 7.366377921746369
              Source: initial sampleStatic PE information: section name: .text entropy: 7.366377921746369
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeFile created: C:\Users\user\remcos\remcos.exeJump to dropped file
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run remcosJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run remcosJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 2732, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3908, type: MEMORYSTR
              Source: s0VxndYXq0.exe, 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000005.00000002.268992522.0000000000410000.00000040.00000400.00020000.00000000.sdmp, remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000000C.00000002.351006623.0000000002F8B000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 00000016.00000002.374683263.000000000336D000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000001A.00000002.341382253.0000000000410000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: remcos.exe, 0000001A.00000002.341382253.0000000000410000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: D/PD/P`\YISBIEDLL.DLL
              Source: s0VxndYXq0.exe, 00000005.00000002.268992522.0000000000410000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: D/PD/P`\COSBIEDLL.DLL
              Source: s0VxndYXq0.exe, 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE PING 127.0.0.1 -n 2
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE PING 127.0.0.1 -n 2
              Source: C:\Users\user\Desktop\s0VxndYXq0.exe TID: 4288Thread sleep time: -45877s >= -30000s
              Source: C:\Users\user\Desktop\s0VxndYXq0.exe TID: 1400Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\remcos\remcos.exe TID: 2960Thread sleep time: -45877s >= -30000s
              Source: C:\Users\user\remcos\remcos.exe TID: 3584Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\remcos\remcos.exe TID: 5536Thread sleep time: -45877s >= -30000s
              Source: C:\Users\user\remcos\remcos.exe TID: 2860Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\remcos\remcos.exe TID: 3656Thread sleep time: -45877s >= -30000s
              Source: C:\Users\user\remcos\remcos.exe TID: 5752Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\remcos\remcos.exe TID: 2188Thread sleep time: -50000s >= -30000s
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\remcos\remcos.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\remcos\remcos.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeThread delayed: delay time: 45877
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 45877
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 45877
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 45877
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 922337203685477
              Source: s0VxndYXq0.exe, 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000005.00000002.268992522.0000000000410000.00000040.00000400.00020000.00000000.sdmp, remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000001A.00000002.341382253.0000000000410000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
              Source: remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
              Source: remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
              Source: s0VxndYXq0.exe, 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000005.00000002.268992522.0000000000410000.00000040.00000400.00020000.00000000.sdmp, remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000001A.00000002.341382253.0000000000410000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: @HARDWARE\ACPI\DSDT\VBOX__PROCMON_WINDOW_CLASSPROCEXPL21invalid vector<T> subscript?playaudiodatafmt WAVERIFF.wav%Y-%m-%d %H.%MgetcamsingleframenocamerastartcamcapclosecamgetcamframeinitcamcapFreeFrameGetFrameCloseCameraOpenCameracamdlldatacamframe|dmc|[DataStart][DataStart]0000%02i:%02i:%02i:%03i [KeepAlive] Enabled! (Timeout: %i seconds)
              Source: remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
              Source: C:\Users\user\remcos\remcos.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeMemory allocated: page read and write | page guard

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeMemory written: C:\Users\user\Desktop\s0VxndYXq0.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\remcos\remcos.exeMemory written: C:\Users\user\remcos\remcos.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\remcos\remcos.exeMemory written: C:\Users\user\remcos\remcos.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess created: C:\Users\user\Desktop\s0VxndYXq0.exe C:\Users\user\Desktop\s0VxndYXq0.exe
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\install.bat" "
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE PING 127.0.0.1 -n 2
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\remcos\remcos.exe "C:\Users\user\remcos\remcos.exe"
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Users\user\Desktop\s0VxndYXq0.exe VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Users\user\remcos\remcos.exe VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Users\user\remcos\remcos.exe VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Users\user\remcos\remcos.exe VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001C.00000002.365233653.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.342391067.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.269857625.0000000002CD0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000002.493007691.00000000029B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 2732, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 3264, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3908, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5540, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3572, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5580, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001C.00000002.365233653.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.342391067.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.269857625.0000000002CD0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000002.493007691.00000000029B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 2732, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 3264, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3908, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5540, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3572, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5580, type: MEMORYSTR
              Source: s0VxndYXq0.exe, 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: s0VxndYXq0.exe, 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \uninstall.batEXEpathC:\WINDOWS\system32\userinit.exeexplorer.exeupdate.batAppDataProgramFiles\SysWOW64\system32WinDirSystemDrive@@ (32 bit) (64 bit)SOFTWARE\Microsoft\Windows NT\CurrentVersionProductNameInjRemcos_Mutex_InjSoftware\SetProcessDEPPolicyShell32IsUserAnAdminGetComputerNameExWIsWow64Processkernel32kernel32.dllGlobalMemoryStatusExGetModuleFileNameExWKernel32.dllPsapi.dllGetModuleFileNameExAProgram Files (x86)\Program Files\SETTINGS
              Source: s0VxndYXq0.exe, 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: s0VxndYXq0.exe, 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \uninstall.batEXEpathC:\WINDOWS\system32\userinit.exeexplorer.exeupdate.batAppDataProgramFiles\SysWOW64\system32WinDirSystemDrive@@ (32 bit) (64 bit)SOFTWARE\Microsoft\Windows NT\CurrentVersionProductNameInjRemcos_Mutex_InjSoftware\SetProcessDEPPolicyShell32IsUserAnAdminGetComputerNameExWIsWow64Processkernel32kernel32.dllGlobalMemoryStatusExGetModuleFileNameExWKernel32.dllPsapi.dllGetModuleFileNameExAProgram Files (x86)\Program Files\SETTINGS
              Source: s0VxndYXq0.exe, 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: s0VxndYXq0.exe, 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: \uninstall.batEXEpathC:\WINDOWS\system32\userinit.exeexplorer.exeupdate.batAppDataProgramFiles\SysWOW64\system32WinDirSystemDrive@@ (32 bit) (64 bit)SOFTWARE\Microsoft\Windows NT\CurrentVersionProductNameInjRemcos_Mutex_InjSoftware\SetProcessDEPPolicyShell32IsUserAnAdminGetComputerNameExWIsWow64Processkernel32kernel32.dllGlobalMemoryStatusExGetModuleFileNameExWKernel32.dllPsapi.dllGetModuleFileNameExAProgram Files (x86)\Program Files\SETTINGS
              Source: remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \uninstall.batEXEpathC:\WINDOWS\system32\userinit.exeexplorer.exeupdate.batAppDataProgramFiles\SysWOW64\system32WinDirSystemDrive@@ (32 bit) (64 bit)SOFTWARE\Microsoft\Windows NT\CurrentVersionProductNameInjRemcos_Mutex_InjSoftware\SetProcessDEPPolicyShell32IsUserAnAdminGetComputerNameExWIsWow64Processkernel32kernel32.dllGlobalMemoryStatusExGetModuleFileNameExWKernel32.dllPsapi.dllGetModuleFileNameExAProgram Files (x86)\Program Files\SETTINGS
              Source: remcos.exe, 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: remcos.exe, 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \uninstall.batEXEpathC:\WINDOWS\system32\userinit.exeexplorer.exeupdate.batAppDataProgramFiles\SysWOW64\system32WinDirSystemDrive@@ (32 bit) (64 bit)SOFTWARE\Microsoft\Windows NT\CurrentVersionProductNameInjRemcos_Mutex_InjSoftware\SetProcessDEPPolicyShell32IsUserAnAdminGetComputerNameExWIsWow64Processkernel32kernel32.dllGlobalMemoryStatusExGetModuleFileNameExWKernel32.dllPsapi.dllGetModuleFileNameExAProgram Files (x86)\Program Files\SETTINGS
              Source: remcos.exe, 0000001C.00000002.367697487.0000000000E27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Injser
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1
              Scripting
              1
              Registry Run Keys / Startup Folder
              111
              Process Injection
              1
              Masquerading
              1
              Input Capture
              21
              Security Software Discovery
              Remote Services1
              Input Capture
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              Registry Run Keys / Startup Folder
              1
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              Exfiltration Over Bluetooth1
              Non-Standard Port
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
              Virtualization/Sandbox Evasion
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
              Remote Access Software
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
              Process Injection
              NTDS1
              Remote System Discovery
              Distributed Component Object ModelInput CaptureScheduled Transfer1
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Scripting
              LSA Secrets1
              System Network Configuration Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common2
              Obfuscated Files or Information
              Cached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items2
              Software Packing
              DCSync12
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 679299 Sample: s0VxndYXq0 Startdate: 05/08/2022 Architecture: WINDOWS Score: 100 52 Malicious sample detected (through community Yara rule) 2->52 54 Antivirus / Scanner detection for submitted sample 2->54 56 Multi AV Scanner detection for submitted file 2->56 58 7 other signatures 2->58 9 s0VxndYXq0.exe 3 2->9         started        13 remcos.exe 2 2->13         started        15 remcos.exe 2 2->15         started        process3 file4 46 C:\Users\user\AppData\...\s0VxndYXq0.exe.log, ASCII 9->46 dropped 64 Injects a PE file into a foreign processes 9->64 17 s0VxndYXq0.exe 1 5 9->17         started        20 remcos.exe 13->20         started        22 remcos.exe 15->22         started        signatures5 process6 file7 42 C:\Users\user\remcos\remcos.exe, PE32 17->42 dropped 44 C:\Users\user\...\remcos.exe:Zone.Identifier, ASCII 17->44 dropped 24 cmd.exe 1 17->24         started        process8 signatures9 60 Uses ping.exe to sleep 24->60 62 Uses ping.exe to check the status of other devices and networks 24->62 27 remcos.exe 3 24->27         started        30 PING.EXE 1 24->30         started        33 conhost.exe 24->33         started        process10 dnsIp11 66 Antivirus detection for dropped file 27->66 68 Multi AV Scanner detection for dropped file 27->68 70 Machine Learning detection for dropped file 27->70 72 Injects a PE file into a foreign processes 27->72 35 remcos.exe 1 2 27->35         started        38 remcos.exe 27->38         started        40 remcos.exe 27->40         started        50 127.0.0.1 unknown unknown 30->50 signatures12 process13 dnsIp14 48 79.134.225.97, 49765, 49770, 49772 FINK-TELECOM-SERVICESCH Switzerland 35->48

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              s0VxndYXq0.exe54%VirustotalBrowse
              s0VxndYXq0.exe54%ReversingLabsByteCode-MSIL.Trojan.Woreflint
              s0VxndYXq0.exe100%AviraTR/Kryptik.wodao
              s0VxndYXq0.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\remcos\remcos.exe100%AviraTR/Kryptik.wodao
              C:\Users\user\remcos\remcos.exe100%Joe Sandbox ML
              C:\Users\user\remcos\remcos.exe54%ReversingLabsByteCode-MSIL.Trojan.Woreflint
              SourceDetectionScannerLabelLinkDownload
              0.2.s0VxndYXq0.exe.452e400.8.unpack100%AviraHEUR/AGEN.1219514Download File
              5.0.s0VxndYXq0.exe.400000.0.unpack100%AviraHEUR/AGEN.1219514Download File
              0.2.s0VxndYXq0.exe.4545420.9.unpack100%AviraHEUR/AGEN.1219514Download File
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://bladecoding.com/lolnotes/leagueofstats.php?name=0%Avira URL Cloudsafe
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://www.fontbureau.comalsR0%Avira URL Cloudsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.fontbureau.comessed0%URL Reputationsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              79.134.225.973%VirustotalBrowse
              79.134.225.970%Avira URL Cloudsafe
              http://www.agfamonotype.cw0%Avira URL Cloudsafe
              http://www.fontbureau.comalsF0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://fontfabrik.com0%URL Reputationsafe
              http://www.fontbureau.comictav0%Avira URL Cloudsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/%0%URL Reputationsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.fontbureau.com70%Avira URL Cloudsafe
              http://www.fontbureau.comalsk0%Avira URL Cloudsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe
              http://www.fontbureau.com.TTF0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/l-g0%Avira URL Cloudsafe
              http://www.jiyu-kobo.co.jp/Y0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
              http://www.fontbureau.coma0%URL Reputationsafe
              http://www.fontbureau.comd0%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://www.monotype.Wb0%Avira URL Cloudsafe
              http://www.fontbureau.comm0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              79.134.225.97true
              • 3%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.fontbureau.com/designersGs0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://bladecoding.com/lolnotes/leagueofstats.php?name=s0VxndYXq0.exe, remcos.exe.5.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designersFs0VxndYXq0.exe, 00000000.00000003.237791179.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237771360.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237819421.0000000005B1E000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designers/?s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bThes0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.lolking.net/summoner/s0VxndYXq0.exe, remcos.exe.5.drfalse
                        high
                        http://www.fontbureau.comalsRs0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.tiro.coms0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designerss0VxndYXq0.exe, 00000000.00000003.237525657.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238027244.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comesseds0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.goodfont.co.krs0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersPs0VxndYXq0.exe, 00000000.00000003.237710320.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.agfamonotype.cws0VxndYXq0.exe, 00000000.00000003.243809889.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243932808.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243586194.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244127013.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244021936.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243771965.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243848246.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244328823.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244234942.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.249288953.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.274138797.0000000005B2A000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comalsFs0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.coms0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDs0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/cThes0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htms0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.coms0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersas0VxndYXq0.exe, 00000000.00000003.238476266.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238443260.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designerses0VxndYXq0.exe, 00000000.00000003.244079552.0000000005B1C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comictavs0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.galapagosdesign.com/DPleases0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fonts.coms0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.jiyu-kobo.co.jp/%s0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sandoll.co.krs0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.deDPleases0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com7s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.comalsks0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.zhongyicts.com.cns0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sakkal.coms0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com.TTFs0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designersts0VxndYXq0.exe, 00000000.00000003.244112658.0000000005B1C000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244079552.0000000005B1C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.jiyu-kobo.co.jp/l-gs0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/Ys0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.apache.org/licenses/LICENSE-2.0s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fontbureau.coms0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.274032296.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.264248405.0000000005AEB000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://raw.github.com/bladecoding/LoLNotes/master/General.txtOs0VxndYXq0.exe, remcos.exe.5.drfalse
                                          high
                                          http://www.jiyu-kobo.co.jp/jp/s0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.comas0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designerses-es_tradnlws0VxndYXq0.exe, 00000000.00000003.237791179.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237910949.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237771360.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237851832.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237819421.0000000005B1E000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237952730.0000000005B1E000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.comds0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.carterandcone.comls0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://github.com/high6/LoLNotess0VxndYXq0.exe, remcos.exe.5.drfalse
                                              high
                                              http://www.fontbureau.com/designers/cabarga.htmlNs0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.founder.com.cn/cns0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.com/designers/frere-user.htmls0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237981073.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238107631.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238027244.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.monotype.Wbs0VxndYXq0.exe, 00000000.00000003.237033632.0000000005B1E000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237070417.0000000005B20000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.fontbureau.comms0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.jiyu-kobo.co.jp/s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://bit.ly/unCoIY?http://lolnotes-s0VxndYXq0.exe, remcos.exe.5.drfalse
                                                    high
                                                    http://www.fontbureau.com/designers8s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238027244.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      79.134.225.97
                                                      unknownSwitzerland
                                                      6775FINK-TELECOM-SERVICESCHtrue
                                                      IP
                                                      127.0.0.1
                                                      Joe Sandbox Version:35.0.0 Citrine
                                                      Analysis ID:679299
                                                      Start date and time: 05/08/202214:59:082022-08-05 14:59:08 +02:00
                                                      Joe Sandbox Product:CloudBasic
                                                      Overall analysis duration:0h 8m 27s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:light
                                                      Sample file name:s0VxndYXq0 (renamed file extension from none to exe)
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                      Number of analysed new started processes analysed:37
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • HDC enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Detection:MAL
                                                      Classification:mal100.troj.evad.winEXE@23/5@0/2
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HDC Information:Failed
                                                      HCA Information:
                                                      • Successful, ratio: 92%
                                                      • Number of executed functions: 0
                                                      • Number of non-executed functions: 0
                                                      Cookbook Comments:
                                                      • Adjust boot time
                                                      • Enable AMSI
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                      • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                                      • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      TimeTypeDescription
                                                      15:00:21API Interceptor2x Sleep call for process: s0VxndYXq0.exe modified
                                                      15:00:30AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run remcos "C:\Users\user\remcos\remcos.exe"
                                                      15:00:39AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run remcos "C:\Users\user\remcos\remcos.exe"
                                                      15:00:43API Interceptor6x Sleep call for process: remcos.exe modified
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\remcos\remcos.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1308
                                                      Entropy (8bit):5.345811588615766
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                                      MD5:2E016B886BDB8389D2DD0867BE55F87B
                                                      SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                                      SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                                      SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                                      Malicious:false
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                      Process:C:\Users\user\Desktop\s0VxndYXq0.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1308
                                                      Entropy (8bit):5.345811588615766
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                                      MD5:2E016B886BDB8389D2DD0867BE55F87B
                                                      SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                                      SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                                      SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                      Process:C:\Users\user\Desktop\s0VxndYXq0.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:modified
                                                      Size (bytes):83
                                                      Entropy (8bit):4.660536268409599
                                                      Encrypted:false
                                                      SSDEEP:3:cQxCvfn9m1t+CQHovBkwbM2n:cQ2fE1wCSovKwo2n
                                                      MD5:F153731DF7A038F42AAA8D34E873FF25
                                                      SHA1:1C90ACC2243D0DBEDEB28A8F7F719E605D80894D
                                                      SHA-256:BC24BC26EE03AE15EE552CADF887C9FC201D19D76944321883E5C818D0E8A4AF
                                                      SHA-512:F16A79B8A04E90B7B8F43D3001D51FDDDDC07B8D117D1CF978C35C96DDFFD161E6901DA5446EB42758DC980FC79ADC8BCA1B5DA640AB294BD24A8944FF0D01CA
                                                      Malicious:false
                                                      Preview:PING 127.0.0.1 -n 2 ..start "" "C:\Users\user\remcos\remcos.exe"..del %0 ..exit ..
                                                      Process:C:\Users\user\Desktop\s0VxndYXq0.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):950272
                                                      Entropy (8bit):7.359178629458712
                                                      Encrypted:false
                                                      SSDEEP:12288:4Rb0kj3oTB2b2UVFdPBGjIKHfrLPVPf1cLlq+R3rU8weZd+ydGRuwJGdaTuM18N5:4RA0siGjIKHf/NH1eFR7U8wWkTRk
                                                      MD5:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                      SHA1:35C361A8BFDB894E80FE99728E60AD7D08745AF1
                                                      SHA-256:F384A96582763BE490EA4EEED6D3F10291D7DF964F64DB077B4D10697149A7DA
                                                      SHA-512:8576E0ED22421F70350A1108129E6DFA0190335724561CA5093E22A8CEB2E6AD0D61DB77A86C4603C60F4627C091D576B9174DAA2C0545D9D1E032502BC19E3E
                                                      Malicious:true
                                                      Yara Hits:
                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\remcos\remcos.exe, Author: Joe Security
                                                      Antivirus:
                                                      • Antivirus: Avira, Detection: 100%
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 54%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....G.b..............0..`..........n~... ........@.. ....................................@..................................~..W.................................................................................... ............... ..H............text...t^... ...`.................. ..`.rsrc................b..............@..@.reloc...............~..............@..B................P~......H........E..|8......+...X...@E............................................U.....U..`.E.f.8.u...3..f9H.u..@.....a.........0..........*....0...........(.....*.0...........(.....*.0...........(.....*.0..<........(#.......(.......(.......(........(........(........(.....*.0...........{....*..0............}....*.0...........{....*..0............}....*.0...........{....*..0............}....*.0...........{....*..0............}....*.0...........{....*..0............}....*.0..........
                                                      Process:C:\Users\user\Desktop\s0VxndYXq0.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):26
                                                      Entropy (8bit):3.95006375643621
                                                      Encrypted:false
                                                      SSDEEP:3:ggPYV:rPYV
                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                      Malicious:true
                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):7.359178629458712
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Windows Screen Saver (13104/52) 0.07%
                                                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                      File name:s0VxndYXq0.exe
                                                      File size:950272
                                                      MD5:de9784a4f56eaf8affc96754a15a5cd3
                                                      SHA1:35c361a8bfdb894e80fe99728e60ad7d08745af1
                                                      SHA256:f384a96582763be490ea4eeed6d3f10291d7df964f64db077b4d10697149a7da
                                                      SHA512:8576e0ed22421f70350a1108129e6dfa0190335724561ca5093e22a8ceb2e6ad0d61db77a86c4603c60f4627c091d576b9174daa2c0545d9d1e032502bc19e3e
                                                      SSDEEP:12288:4Rb0kj3oTB2b2UVFdPBGjIKHfrLPVPf1cLlq+R3rU8weZd+ydGRuwJGdaTuM18N5:4RA0siGjIKHf/NH1eFR7U8wWkTRk
                                                      TLSH:5D155A99369071EFC857C976CA682C50FB31B576930FD207A45322ADAE0D6ABDF101F2
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....G.b..............0..`..........n~... ........@.. ....................................@................................
                                                      Icon Hash:397165848c36a18d
                                                      Entrypoint:0x4e7e6e
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x62E047C2 [Tue Jul 26 20:00:02 2022 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xe7e140x57.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xe80000x1a90.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xea0000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000xe5e740xe6000False0.7169316830842392data7.366377921746369IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0xe80000x1a900x1c00False0.45717075892857145data5.558425499312093IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xea0000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountry
                                                      RT_ICON0xe81600xd28data
                                                      RT_GROUP_ICON0xe8e880x14data
                                                      RT_GROUP_ICON0xe8e9c0x14data
                                                      RT_VERSION0xe8eb00x33cdata
                                                      RT_MANIFEST0xe91ec0x8a3XML 1.0 document, UTF-8 Unicode (with BOM) text
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Aug 5, 2022 15:00:51.489784956 CEST497658600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:00:51.547962904 CEST86004976579.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:00:52.065028906 CEST497658600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:00:52.123380899 CEST86004976579.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:00:52.709264040 CEST497658600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:00:52.767832994 CEST86004976579.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:00:57.773063898 CEST497708600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:00:57.832314014 CEST86004977079.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:00:58.334733009 CEST497708600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:00:58.393183947 CEST86004977079.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:00:59.022278070 CEST497708600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:00:59.080661058 CEST86004977079.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:04.092365980 CEST497728600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:04.150609970 CEST86004977279.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:04.710223913 CEST497728600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:04.768486977 CEST86004977279.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:05.413645983 CEST497728600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:05.472306967 CEST86004977279.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:10.476984978 CEST497738600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:10.535494089 CEST86004977379.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:11.132644892 CEST497738600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:11.191097975 CEST86004977379.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:11.835798979 CEST497738600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:11.897294044 CEST86004977379.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:16.906243086 CEST497748600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:16.964862108 CEST86004977479.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:17.602025032 CEST497748600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:17.660366058 CEST86004977479.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:18.211484909 CEST497748600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:18.269845963 CEST86004977479.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:23.275614977 CEST497768600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:23.334021091 CEST86004977679.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:23.914994955 CEST497768600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:23.973387957 CEST86004977679.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:24.602653980 CEST497768600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:24.661000013 CEST86004977679.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:29.691310883 CEST498018600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:29.749579906 CEST86004980179.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:30.337486982 CEST498018600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:30.395963907 CEST86004980179.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:31.024995089 CEST498018600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:31.083328009 CEST86004980179.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:36.541906118 CEST498198600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:36.600670099 CEST86004981979.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:37.135059118 CEST498198600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:37.193582058 CEST86004981979.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:37.838089943 CEST498198600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:37.896397114 CEST86004981979.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:42.902713060 CEST498278600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:42.961273909 CEST86004982779.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:43.463576078 CEST498278600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:43.522169113 CEST86004982779.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:44.026073933 CEST498278600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:44.084547043 CEST86004982779.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:49.099905968 CEST498368600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:49.158422947 CEST86004983679.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:49.667279005 CEST498368600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:49.725716114 CEST86004983679.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:50.229877949 CEST498368600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:50.288291931 CEST86004983679.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:56.090359926 CEST498448600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:56.148978949 CEST86004984479.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:56.652179956 CEST498448600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:56.710563898 CEST86004984479.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:01:57.214720964 CEST498448600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:01:57.273039103 CEST86004984479.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:02:02.278929949 CEST498618600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:02:02.337223053 CEST86004986179.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:02:02.840158939 CEST498618600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:02:02.898443937 CEST86004986179.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:02:03.402717113 CEST498618600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:02:03.460984945 CEST86004986179.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:02:09.368092060 CEST498658600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:02:09.426564932 CEST86004986579.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:02:10.090811968 CEST498658600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:02:10.149149895 CEST86004986579.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:02:10.700218916 CEST498658600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:02:10.758519888 CEST86004986579.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:02:15.763689041 CEST498668600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:02:15.821871996 CEST86004986679.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:02:16.325689077 CEST498668600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:02:16.384908915 CEST86004986679.134.225.97192.168.2.4
                                                      Aug 5, 2022 15:02:16.888501883 CEST498668600192.168.2.479.134.225.97
                                                      Aug 5, 2022 15:02:16.946827888 CEST86004986679.134.225.97192.168.2.4

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:15:00:07
                                                      Start date:05/08/2022
                                                      Path:C:\Users\user\Desktop\s0VxndYXq0.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\s0VxndYXq0.exe"
                                                      Imagebase:0x550000
                                                      File size:950272 bytes
                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Remcos, Description: detect Remcos in memory, Source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Remcos, Description: detect Remcos in memory, Source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                      Reputation:low

                                                      Target ID:5
                                                      Start time:15:00:23
                                                      Start date:05/08/2022
                                                      Path:C:\Users\user\Desktop\s0VxndYXq0.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\Desktop\s0VxndYXq0.exe
                                                      Imagebase:0x930000
                                                      File size:950272 bytes
                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.269857625.0000000002CD0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low

                                                      Target ID:6
                                                      Start time:15:00:27
                                                      Start date:05/08/2022
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\install.bat" "
                                                      Imagebase:0x1190000
                                                      File size:232960 bytes
                                                      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      Target ID:7
                                                      Start time:15:00:28
                                                      Start date:05/08/2022
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff7338d0000
                                                      File size:625664 bytes
                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      Target ID:8
                                                      Start time:15:00:29
                                                      Start date:05/08/2022
                                                      Path:C:\Windows\SysWOW64\PING.EXE
                                                      Wow64 process (32bit):true
                                                      Commandline:PING 127.0.0.1 -n 2
                                                      Imagebase:0x13b0000
                                                      File size:18944 bytes
                                                      MD5 hash:70C24A306F768936563ABDADB9CA9108
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      Target ID:9
                                                      Start time:15:00:30
                                                      Start date:05/08/2022
                                                      Path:C:\Users\user\remcos\remcos.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\remcos\remcos.exe"
                                                      Imagebase:0x530000
                                                      File size:950272 bytes
                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Remcos, Description: detect Remcos in memory, Source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\remcos\remcos.exe, Author: Joe Security
                                                      Antivirus matches:
                                                      • Detection: 100%, Avira
                                                      • Detection: 100%, Joe Sandbox ML
                                                      • Detection: 54%, ReversingLabs
                                                      Reputation:low

                                                      Target ID:12
                                                      Start time:15:00:39
                                                      Start date:05/08/2022
                                                      Path:C:\Users\user\remcos\remcos.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\remcos\remcos.exe"
                                                      Imagebase:0x950000
                                                      File size:950272 bytes
                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Remcos, Description: detect Remcos in memory, Source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                      Reputation:low

                                                      Target ID:21
                                                      Start time:15:00:47
                                                      Start date:05/08/2022
                                                      Path:C:\Users\user\remcos\remcos.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Users\user\remcos\remcos.exe
                                                      Imagebase:0x1b0000
                                                      File size:950272 bytes
                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low

                                                      Target ID:22
                                                      Start time:15:00:47
                                                      Start date:05/08/2022
                                                      Path:C:\Users\user\remcos\remcos.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\remcos\remcos.exe"
                                                      Imagebase:0xb70000
                                                      File size:950272 bytes
                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Reputation:low

                                                      Target ID:23
                                                      Start time:15:00:48
                                                      Start date:05/08/2022
                                                      Path:C:\Users\user\remcos\remcos.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Users\user\remcos\remcos.exe
                                                      Imagebase:0x80000
                                                      File size:950272 bytes
                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low

                                                      Target ID:24
                                                      Start time:15:00:49
                                                      Start date:05/08/2022
                                                      Path:C:\Users\user\remcos\remcos.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\remcos\remcos.exe
                                                      Imagebase:0x850000
                                                      File size:950272 bytes
                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000018.00000002.493007691.00000000029B0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low

                                                      Target ID:26
                                                      Start time:15:01:00
                                                      Start date:05/08/2022
                                                      Path:C:\Users\user\remcos\remcos.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\remcos\remcos.exe
                                                      Imagebase:0xbe0000
                                                      File size:950272 bytes
                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000002.342391067.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low

                                                      Target ID:28
                                                      Start time:15:01:11
                                                      Start date:05/08/2022
                                                      Path:C:\Users\user\remcos\remcos.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\remcos\remcos.exe
                                                      Imagebase:0x650000
                                                      File size:950272 bytes
                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001C.00000002.365233653.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low

                                                      No disassembly