Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
llcubnch6T

Overview

General Information

Sample Name:llcubnch6T (renamed file extension from none to exe)
Analysis ID:679479
MD5:44e407b3de4a9865ab747bdca810b0b9
SHA1:6eb199e6837432d8acb98c03b22277f340726372
SHA256:da6abb6f3aae250d50ed09b6eacc267c33e50895e3ebd7e6ba800ab018351ec5
Tags:32exetrojan
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected AsyncRAT
Multi AV Scanner detection for dropped file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Machine Learning detection for dropped file
Adds a directory exclusion to Windows Defender
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • llcubnch6T.exe (PID: 5324 cmdline: "C:\Users\user\Desktop\llcubnch6T.exe" MD5: 44E407B3DE4A9865AB747BDCA810B0B9)
    • powershell.exe (PID: 5040 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RhFYnHFgJ.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 6132 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RhFYnHFgJ" /XML "C:\Users\user\AppData\Local\Temp\tmp95A0.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 1672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • llcubnch6T.exe (PID: 3720 cmdline: C:\Users\user\Desktop\llcubnch6T.exe MD5: 44E407B3DE4A9865AB747BDCA810B0B9)
  • cleanup
{"Server": "91.193.75.135", "Ports": "3030", "Version": "0.5.7B", "Autorun": "false", "Install_Folder": "%AppData%"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.418726957.0000000003063000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000009.00000002.630822289.0000000003051000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x140ef:$x1: AsyncRAT
    • 0x1412d:$x1: AsyncRAT
    00000009.00000000.410857927.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000009.00000000.410857927.0000000000402000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xa0d9:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      00000009.00000002.635757563.00000000055A6000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x8743:$x1: AsyncRAT
      • 0x8781:$x1: AsyncRAT
      Click to see the 7 entries
      SourceRuleDescriptionAuthorStrings
      0.2.llcubnch6T.exe.30fdb24.6.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        0.2.llcubnch6T.exe.30fdb24.6.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
        • 0x84d9:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        0.2.llcubnch6T.exe.310ae28.5.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          0.2.llcubnch6T.exe.310ae28.5.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
          • 0x84d9:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
          0.2.llcubnch6T.exe.30fdb24.6.raw.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            Click to see the 10 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: llcubnch6T.exeVirustotal: Detection: 53%Perma Link
            Source: C:\Users\user\AppData\Roaming\RhFYnHFgJ.exeReversingLabs: Detection: 53%
            Source: llcubnch6T.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\RhFYnHFgJ.exeJoe Sandbox ML: detected
            Source: 00000000.00000002.419146088.00000000030EE000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "91.193.75.135", "Ports": "3030", "Version": "0.5.7B", "Autorun": "false", "Install_Folder": "%AppData%"}
            Source: llcubnch6T.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: llcubnch6T.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\llcubnch6T.exeCode function: 4x nop then jmp 010B5A17h0_2_010B5798

            Networking

            barindex
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.30fdb24.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.30ee614.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.310ae28.5.raw.unpack, type: UNPACKEDPE
            Source: Joe Sandbox ViewIP Address: 91.193.75.135 91.193.75.135
            Source: global trafficTCP traffic: 192.168.2.6:49765 -> 91.193.75.135:3030
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.135
            Source: llcubnch6T.exe, 00000000.00000003.370486654.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.370416567.0000000005F77000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.w
            Source: llcubnch6T.exe, 00000000.00000003.369532282.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369672069.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369439345.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369755917.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369565571.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
            Source: llcubnch6T.exe, 00000000.00000003.369532282.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369344253.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369439345.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.comi;
            Source: llcubnch6T.exe, 00000000.00000003.369532282.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369672069.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369755917.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369565571.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.comz
            Source: llcubnch6T.exe, 00000000.00000002.418726957.0000000003063000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: llcubnch6T.exe, 00000000.00000003.373444862.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373397776.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373494865.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: llcubnch6T.exe, 00000000.00000003.376677530.0000000005F74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
            Source: llcubnch6T.exe, 00000000.00000003.374008369.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.374159108.0000000005F79000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.374208532.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373945445.0000000005F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comadD
            Source: llcubnch6T.exe, 00000000.00000003.374008369.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.374159108.0000000005F79000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.374208532.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373945445.0000000005F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comic
            Source: llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: llcubnch6T.exe, 00000000.00000003.379280133.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381656755.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381059048.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378729506.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381273773.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.386539619.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379770002.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379922349.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379140386.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378822721.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: llcubnch6T.exe, 00000000.00000003.379622921.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379851679.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380056944.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379770002.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: llcubnch6T.exe, 00000000.00000003.380490931.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380611387.0000000005F70000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380236923.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380325146.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380749411.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380956167.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381059048.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381273773.0000000005F74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
            Source: llcubnch6T.exe, 00000000.00000003.381774652.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380749411.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381516393.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.382095894.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380956167.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381656755.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381059048.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381273773.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381931622.0000000005F74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comL.TTF
            Source: llcubnch6T.exe, 00000000.00000003.380490931.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380325146.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma;
            Source: llcubnch6T.exe, 00000000.00000003.380611387.0000000005F70000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380749411.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381516393.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380956167.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381059048.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381273773.0000000005F74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalic
            Source: llcubnch6T.exe, 00000000.00000003.386884447.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.386656862.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.413372395.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.386539619.0000000005F74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comav;
            Source: llcubnch6T.exe, 00000000.00000003.386884447.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.386656862.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.386539619.0000000005F74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comceta
            Source: llcubnch6T.exe, 00000000.00000003.386884447.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.386656862.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.413372395.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.386539619.0000000005F74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcetoS;
            Source: llcubnch6T.exe, 00000000.00000003.379374870.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379622921.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379851679.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379548812.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379280133.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379770002.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379922349.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379140386.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
            Source: llcubnch6T.exe, 00000000.00000003.379374870.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379622921.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379851679.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379548812.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379280133.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379770002.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379922349.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379140386.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.come.com
            Source: llcubnch6T.exe, 00000000.00000003.379374870.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379548812.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379280133.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379140386.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comepko
            Source: llcubnch6T.exe, 00000000.00000003.379374870.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379280133.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comion
            Source: llcubnch6T.exe, 00000000.00000003.380490931.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380611387.0000000005F70000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380236923.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380325146.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380749411.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381516393.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380956167.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381059048.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381273773.0000000005F74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comituFv;
            Source: llcubnch6T.exe, 00000000.00000003.378729506.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comnc.Z;
            Source: llcubnch6T.exe, 00000000.00000003.379622921.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379851679.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380056944.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379770002.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379922349.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comonydZ;
            Source: llcubnch6T.exe, 00000000.00000003.380490931.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380611387.0000000005F70000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380325146.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsiv9
            Source: llcubnch6T.exe, 00000000.00000003.379851679.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380056944.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379770002.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379922349.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comueta
            Source: llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: llcubnch6T.exe, 00000000.00000003.372828062.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372581826.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372713612.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372553600.0000000005F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: llcubnch6T.exe, 00000000.00000003.372828062.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372078011.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
            Source: llcubnch6T.exe, 00000000.00000003.372183289.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372085870.0000000005F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/aj#W
            Source: llcubnch6T.exe, 00000000.00000003.372828062.0000000005F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/ar
            Source: llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: llcubnch6T.exe, 00000000.00000003.373045911.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372828062.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372992295.0000000005F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnMic
            Source: llcubnch6T.exe, 00000000.00000003.373045911.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372828062.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373098086.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372992295.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372713612.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373141901.0000000005F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnl-g
            Source: llcubnch6T.exe, 00000000.00000003.373045911.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372828062.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373098086.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372992295.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373257248.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372713612.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373141901.0000000005F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cns
            Source: llcubnch6T.exe, 00000000.00000003.382515419.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.383198382.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.383615585.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.382620508.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.383062477.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.383441888.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.383716381.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.382877880.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.382700986.0000000005F74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
            Source: llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: llcubnch6T.exe, 00000000.00000003.382515419.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.382620508.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.382700986.0000000005F74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/Z;
            Source: llcubnch6T.exe, 00000000.00000003.382620508.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: llcubnch6T.exe, 00000000.00000003.371976372.0000000005F70000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: llcubnch6T.exe, 00000000.00000003.371976372.0000000005F70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.krtp
            Source: llcubnch6T.exe, 00000000.00000003.377084125.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376932034.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.377017050.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.itcfonts.
            Source: llcubnch6T.exe, 00000000.00000003.376677530.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.377578464.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376099331.0000000005F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: llcubnch6T.exe, 00000000.00000003.376766485.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376932034.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376589985.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376392718.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376159863.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376612294.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376304898.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376546388.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376677530.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376099331.0000000005F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/E;
            Source: llcubnch6T.exe, 00000000.00000003.376589985.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376392718.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376304898.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376546388.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0-sa;
            Source: llcubnch6T.exe, 00000000.00000003.376589985.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376392718.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376159863.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376612294.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376304898.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376546388.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376099331.0000000005F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0W
            Source: llcubnch6T.exe, 00000000.00000003.375863348.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.375712201.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/de-d
            Source: llcubnch6T.exe, 00000000.00000003.376766485.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376932034.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376589985.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376612294.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376546388.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376677530.0000000005F74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/h;
            Source: llcubnch6T.exe, 00000000.00000003.376099331.0000000005F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
            Source: llcubnch6T.exe, 00000000.00000003.375863348.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.375712201.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.375949766.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/knl
            Source: llcubnch6T.exe, 00000000.00000003.376392718.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376159863.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376304898.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376048892.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.375949766.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376099331.0000000005F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/lth;
            Source: llcubnch6T.exe, 00000000.00000003.376589985.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376392718.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376612294.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376304898.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376546388.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/oi
            Source: llcubnch6T.exe, 00000000.00000003.376048892.0000000005F72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/u-hE;
            Source: llcubnch6T.exe, 00000000.00000003.376589985.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376392718.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376159863.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376304898.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376048892.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376546388.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.375949766.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376099331.0000000005F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/v;
            Source: llcubnch6T.exe, 00000000.00000003.367498032.0000000005F52000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: llcubnch6T.exe, 00000000.00000003.367498032.0000000005F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com2
            Source: llcubnch6T.exe, 00000000.00000003.367498032.0000000005F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.come
            Source: llcubnch6T.exe, 00000000.00000003.377084125.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376766485.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376932034.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.377017050.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.377194158.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376677530.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: llcubnch6T.exe, 00000000.00000003.376677530.0000000005F74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com0
            Source: llcubnch6T.exe, 00000000.00000003.371976372.0000000005F70000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372078011.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372146838.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.371863268.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: llcubnch6T.exe, 00000000.00000003.371976372.0000000005F70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kront
            Source: llcubnch6T.exe, 00000000.00000003.371976372.0000000005F70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krtp
            Source: llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: llcubnch6T.exe, 00000000.00000003.374266055.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.374439978.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.374621756.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comslnt
            Source: llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: llcubnch6T.exe, 00000000.00000003.378274559.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378415798.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380956167.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381059048.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378491515.0000000005F72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
            Source: llcubnch6T.exe, 00000000.00000003.378274559.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378415798.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378491515.0000000005F72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deC
            Source: llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: llcubnch6T.exe, 00000000.00000003.380956167.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381059048.0000000005F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deFT
            Source: llcubnch6T.exe, 00000000.00000003.378274559.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378415798.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378491515.0000000005F72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deo$
            Source: llcubnch6T.exe, 00000000.00000003.373754624.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: llcubnch6T.exe, 00000000.00000003.373754624.0000000005F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnarS/
            Source: llcubnch6T.exe, 00000000.00000003.373754624.0000000005F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.
            Source: llcubnch6T.exe, 00000000.00000003.373754624.0000000005F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.f

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.30fdb24.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.310ae28.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.30fdb24.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.llcubnch6T.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.30ee614.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.310ae28.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000000.410857927.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.419146088.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: llcubnch6T.exe PID: 5324, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: llcubnch6T.exe PID: 3720, type: MEMORYSTR
            Source: llcubnch6T.exe, 00000000.00000002.414992989.000000000123B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            System Summary

            barindex
            Source: 0.2.llcubnch6T.exe.30fdb24.6.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.llcubnch6T.exe.310ae28.5.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.llcubnch6T.exe.30fdb24.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 9.0.llcubnch6T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.llcubnch6T.exe.30ee614.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.llcubnch6T.exe.310ae28.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000009.00000002.630822289.0000000003051000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000009.00000000.410857927.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000009.00000002.635757563.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.419146088.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: llcubnch6T.exe PID: 3720, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: llcubnch6T.exe PID: 3720, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: llcubnch6T.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.llcubnch6T.exe.30fdb24.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.llcubnch6T.exe.310ae28.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.llcubnch6T.exe.30fdb24.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 9.0.llcubnch6T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.llcubnch6T.exe.30ee614.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.llcubnch6T.exe.310ae28.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000009.00000002.630822289.0000000003051000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000009.00000000.410857927.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000009.00000002.635757563.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.419146088.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: llcubnch6T.exe PID: 3720, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: llcubnch6T.exe PID: 3720, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: C:\Users\user\Desktop\llcubnch6T.exeCode function: 0_2_010BDF0C0_2_010BDF0C
            Source: llcubnch6T.exe, 00000000.00000002.427448862.0000000005F10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamePlates.dll4 vs llcubnch6T.exe
            Source: llcubnch6T.exe, 00000000.00000002.419675313.0000000004689000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSchedulingClerk.dll. vs llcubnch6T.exe
            Source: llcubnch6T.exe, 00000000.00000002.416245004.0000000002E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFroor.dll4 vs llcubnch6T.exe
            Source: llcubnch6T.exe, 00000000.00000002.431213739.00000000060E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFroor.dll4 vs llcubnch6T.exe
            Source: llcubnch6T.exe, 00000000.00000003.387819597.00000000012BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePlates.dll4 vs llcubnch6T.exe
            Source: llcubnch6T.exe, 00000000.00000002.419146088.00000000030EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename" vs llcubnch6T.exe
            Source: llcubnch6T.exe, 00000000.00000002.433660916.0000000008030000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSchedulingClerk.dll. vs llcubnch6T.exe
            Source: llcubnch6T.exe, 00000009.00000000.411378615.000000000040E000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename" vs llcubnch6T.exe
            Source: llcubnch6T.exeBinary or memory string: OriginalFilenameTypeLibVarFl.exe< vs llcubnch6T.exe
            Source: llcubnch6T.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: RhFYnHFgJ.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: llcubnch6T.exeVirustotal: Detection: 53%
            Source: C:\Users\user\Desktop\llcubnch6T.exeFile read: C:\Users\user\Desktop\llcubnch6T.exeJump to behavior
            Source: llcubnch6T.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\llcubnch6T.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\llcubnch6T.exe "C:\Users\user\Desktop\llcubnch6T.exe"
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RhFYnHFgJ.exe
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RhFYnHFgJ" /XML "C:\Users\user\AppData\Local\Temp\tmp95A0.tmp
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess created: C:\Users\user\Desktop\llcubnch6T.exe C:\Users\user\Desktop\llcubnch6T.exe
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RhFYnHFgJ.exeJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RhFYnHFgJ" /XML "C:\Users\user\AppData\Local\Temp\tmp95A0.tmpJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess created: C:\Users\user\Desktop\llcubnch6T.exe C:\Users\user\Desktop\llcubnch6T.exeJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeFile created: C:\Users\user\AppData\Roaming\RhFYnHFgJ.exeJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeFile created: C:\Users\user\AppData\Local\Temp\tmp95A0.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winEXE@9/8@0/1
            Source: C:\Users\user\Desktop\llcubnch6T.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: llcubnch6T.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\llcubnch6T.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5308:120:WilError_01
            Source: C:\Users\user\Desktop\llcubnch6T.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1672:120:WilError_01
            Source: llcubnch6T.exe, Login.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: RhFYnHFgJ.exe.0.dr, Login.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 0.0.llcubnch6T.exe.a30000.0.unpack, Login.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\llcubnch6T.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: llcubnch6T.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: llcubnch6T.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: llcubnch6T.exe, Login.cs.Net Code: WaitHandle System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: RhFYnHFgJ.exe.0.dr, Login.cs.Net Code: WaitHandle System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.llcubnch6T.exe.a30000.0.unpack, Login.cs.Net Code: WaitHandle System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: initial sampleStatic PE information: section name: .text entropy: 7.2738007120716635
            Source: initial sampleStatic PE information: section name: .text entropy: 7.2738007120716635
            Source: C:\Users\user\Desktop\llcubnch6T.exeFile created: C:\Users\user\AppData\Roaming\RhFYnHFgJ.exeJump to dropped file

            Boot Survival

            barindex
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.30fdb24.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.310ae28.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.30fdb24.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.llcubnch6T.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.30ee614.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.310ae28.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000000.410857927.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.419146088.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: llcubnch6T.exe PID: 5324, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: llcubnch6T.exe PID: 3720, type: MEMORYSTR
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RhFYnHFgJ" /XML "C:\Users\user\AppData\Local\Temp\tmp95A0.tmp
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 00000000.00000002.418726957.0000000003063000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: llcubnch6T.exe PID: 5324, type: MEMORYSTR
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.30fdb24.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.310ae28.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.30fdb24.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.llcubnch6T.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.30ee614.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.310ae28.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000000.410857927.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.419146088.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: llcubnch6T.exe PID: 5324, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: llcubnch6T.exe PID: 3720, type: MEMORYSTR
            Source: llcubnch6T.exe, 00000000.00000002.418726957.0000000003063000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.419146088.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000009.00000000.410857927.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: llcubnch6T.exe, 00000000.00000002.418726957.0000000003063000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Source: C:\Users\user\Desktop\llcubnch6T.exe TID: 5396Thread sleep time: -45877s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exe TID: 2952Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3716Thread sleep time: -4611686018427385s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exe TID: 3772Thread sleep time: -65000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\llcubnch6T.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\llcubnch6T.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8958Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeThread delayed: delay time: 45877Jump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: llcubnch6T.exe, 00000000.00000002.418726957.0000000003063000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: llcubnch6T.exe, 00000009.00000000.410857927.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: vmware
            Source: llcubnch6T.exe, 00000000.00000002.418726957.0000000003063000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
            Source: llcubnch6T.exe, 00000009.00000002.635815470.00000000055BA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: llcubnch6T.exe, 00000000.00000002.418726957.0000000003063000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\llcubnch6T.exeMemory written: C:\Users\user\Desktop\llcubnch6T.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RhFYnHFgJ.exe
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RhFYnHFgJ.exeJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RhFYnHFgJ.exeJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RhFYnHFgJ" /XML "C:\Users\user\AppData\Local\Temp\tmp95A0.tmpJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeProcess created: C:\Users\user\Desktop\llcubnch6T.exe C:\Users\user\Desktop\llcubnch6T.exeJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Users\user\Desktop\llcubnch6T.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeQueries volume information: C:\Users\user\Desktop\llcubnch6T.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\llcubnch6T.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.30fdb24.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.310ae28.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.30fdb24.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.llcubnch6T.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.30ee614.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.llcubnch6T.exe.310ae28.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000000.410857927.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.419146088.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: llcubnch6T.exe PID: 5324, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: llcubnch6T.exe PID: 3720, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts2
            Scheduled Task/Job
            2
            Scheduled Task/Job
            111
            Process Injection
            1
            Masquerading
            1
            Input Capture
            21
            Security Software Discovery
            Remote Services1
            Input Capture
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
            Scheduled Task/Job
            11
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
            Virtualization/Sandbox Evasion
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common12
            Obfuscated Files or Information
            Cached Domain Credentials13
            System Information Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items12
            Software Packing
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            llcubnch6T.exe54%VirustotalBrowse
            llcubnch6T.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\RhFYnHFgJ.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\RhFYnHFgJ.exe54%ReversingLabsByteCode-MSIL.Trojan.FormBook
            SourceDetectionScannerLabelLinkDownload
            9.0.llcubnch6T.exe.400000.0.unpack100%AviraHEUR/AGEN.1202836Download File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.jiyu-kobo.co.jp/v;0%Avira URL Cloudsafe
            http://www.sajatypeworks.com20%URL Reputationsafe
            http://www.fontbureau.comonydZ;0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.fontbureau.comituFv;0%Avira URL Cloudsafe
            http://fontfabrik.comi;0%Avira URL Cloudsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/E;0%Avira URL Cloudsafe
            http://www.fontbureau.comceta0%URL Reputationsafe
            http://www.sandoll.co.kront0%Avira URL Cloudsafe
            http://www.fontbureau.comepko0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/knl0%Avira URL Cloudsafe
            http://www.fontbureau.comsiv90%Avira URL Cloudsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.zhongyicts.com.cnarS/0%Avira URL Cloudsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cnl-g0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/Y0-sa;0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/lth;0%Avira URL Cloudsafe
            http://fontfabrik.comz0%Avira URL Cloudsafe
            http://www.founder.com.cn/cns0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/Y0W0%Avira URL Cloudsafe
            http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
            http://www.itcfonts.0%URL Reputationsafe
            http://www.urwpp.deFT0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.fontbureau.comnc.Z;0%Avira URL Cloudsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.sandoll.co.krtp0%Avira URL Cloudsafe
            http://www.urwpp.de0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sajatypeworks.come0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.carterandcone.comic0%URL Reputationsafe
            http://www.founder.com.cn/cnMic0%Avira URL Cloudsafe
            http://www.galapagosdesign.com/0%URL Reputationsafe
            http://www.fontbureau.comF0%URL Reputationsafe
            http://www.tiro.comslnt0%URL Reputationsafe
            http://www.founder.com.cn/cn/ar0%Avira URL Cloudsafe
            http://www.fontbureau.comueta0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/h;0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/aj#W0%Avira URL Cloudsafe
            http://www.carterandcone.comadD0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/u-hE;0%Avira URL Cloudsafe
            http://www.fontbureau.comion0%URL Reputationsafe
            http://www.fontbureau.comL.TTF0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/oi0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
            http://www.fontbureau.comd0%URL Reputationsafe
            http://www.fontbureau.come.com0%URL Reputationsafe
            http://en.w0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.urwpp.deC0%URL Reputationsafe
            http://www.founder.com.cn/cn/0%URL Reputationsafe
            http://www.sakkal.com00%Avira URL Cloudsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.goodfont.co.krtp0%Avira URL Cloudsafe
            http://www.fontbureau.coma;0%Avira URL Cloudsafe
            http://www.urwpp.deo$0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.fontbureau.comcetoS;0%Avira URL Cloudsafe
            http://www.zhongyicts.com.cno.0%URL Reputationsafe
            http://www.fontbureau.comalic0%URL Reputationsafe
            http://www.fontbureau.comav;0%Avira URL Cloudsafe
            http://www.galapagosdesign.com/Z;0%Avira URL Cloudsafe
            http://www.zhongyicts.com.cno.f0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/de-d0%Avira URL Cloudsafe
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.fontbureau.com/designersGllcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.jiyu-kobo.co.jp/v;llcubnch6T.exe, 00000000.00000003.376589985.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376392718.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376159863.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376304898.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376048892.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376546388.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.375949766.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376099331.0000000005F71000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.sajatypeworks.com2llcubnch6T.exe, 00000000.00000003.367498032.0000000005F52000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers/?llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comonydZ;llcubnch6T.exe, 00000000.00000003.379622921.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379851679.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380056944.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379770002.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379922349.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://www.founder.com.cn/cn/bThellcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers?llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.comituFv;llcubnch6T.exe, 00000000.00000003.380490931.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380611387.0000000005F70000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380236923.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380325146.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380749411.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381516393.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380956167.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381059048.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381273773.0000000005F74000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://fontfabrik.comi;llcubnch6T.exe, 00000000.00000003.369532282.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369344253.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369439345.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.tiro.comllcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/E;llcubnch6T.exe, 00000000.00000003.376766485.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376932034.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376589985.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376392718.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376159863.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376612294.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376304898.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376546388.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376677530.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376099331.0000000005F71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.comcetallcubnch6T.exe, 00000000.00000003.386884447.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.386656862.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.386539619.0000000005F74000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.sandoll.co.krontllcubnch6T.exe, 00000000.00000003.371976372.0000000005F70000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.com/designersllcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.comepkollcubnch6T.exe, 00000000.00000003.379374870.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379548812.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379280133.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379140386.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.goodfont.co.krllcubnch6T.exe, 00000000.00000003.371976372.0000000005F70000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/knlllcubnch6T.exe, 00000000.00000003.375863348.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.375712201.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.375949766.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.comsiv9llcubnch6T.exe, 00000000.00000003.380490931.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380611387.0000000005F70000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380325146.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.sajatypeworks.comllcubnch6T.exe, 00000000.00000003.367498032.0000000005F52000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netDllcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/cThellcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmllcubnch6T.exe, 00000000.00000003.382620508.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.zhongyicts.com.cnarS/llcubnch6T.exe, 00000000.00000003.373754624.0000000005F78000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://fontfabrik.comllcubnch6T.exe, 00000000.00000003.369532282.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369672069.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369439345.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369755917.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369565571.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnl-gllcubnch6T.exe, 00000000.00000003.373045911.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372828062.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373098086.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372992295.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372713612.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373141901.0000000005F78000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/Y0-sa;llcubnch6T.exe, 00000000.00000003.376589985.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376392718.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376304898.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376546388.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/lth;llcubnch6T.exe, 00000000.00000003.376392718.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376159863.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376304898.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376048892.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.375949766.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376099331.0000000005F71000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://fontfabrik.comzllcubnch6T.exe, 00000000.00000003.369532282.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369672069.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369755917.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.369565571.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.founder.com.cn/cnsllcubnch6T.exe, 00000000.00000003.373045911.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372828062.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373098086.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372992295.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373257248.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372713612.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373141901.0000000005F78000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/DPleasellcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/Y0Wllcubnch6T.exe, 00000000.00000003.376589985.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376392718.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376159863.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376612294.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376304898.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376546388.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376099331.0000000005F71000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.ascendercorp.com/typedesigners.htmlllcubnch6T.exe, 00000000.00000003.376677530.0000000005F74000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.itcfonts.llcubnch6T.exe, 00000000.00000003.377084125.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376932034.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.377017050.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.urwpp.deFTllcubnch6T.exe, 00000000.00000003.380956167.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381059048.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fonts.comllcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.sandoll.co.krllcubnch6T.exe, 00000000.00000003.371976372.0000000005F70000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372078011.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372146838.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.371863268.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comnc.Z;llcubnch6T.exe, 00000000.00000003.378729506.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.urwpp.deDPleasellcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sandoll.co.krtpllcubnch6T.exe, 00000000.00000003.371976372.0000000005F70000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.urwpp.dellcubnch6T.exe, 00000000.00000003.378274559.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378415798.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380956167.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381059048.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378491515.0000000005F72000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.zhongyicts.com.cnllcubnch6T.exe, 00000000.00000003.373754624.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namellcubnch6T.exe, 00000000.00000002.418726957.0000000003063000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.sajatypeworks.comellcubnch6T.exe, 00000000.00000003.367498032.0000000005F52000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sakkal.comllcubnch6T.exe, 00000000.00000003.377084125.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376766485.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376932034.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.377017050.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.377194158.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376677530.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comicllcubnch6T.exe, 00000000.00000003.374008369.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.374159108.0000000005F79000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.374208532.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373945445.0000000005F78000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.apache.org/licenses/LICENSE-2.0llcubnch6T.exe, 00000000.00000003.373444862.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373397776.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373494865.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comllcubnch6T.exe, 00000000.00000003.379280133.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381656755.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381059048.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378729506.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381273773.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.386539619.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379770002.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379922349.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379140386.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378822721.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.founder.com.cn/cnMicllcubnch6T.exe, 00000000.00000003.373045911.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372828062.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372992295.0000000005F78000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.galapagosdesign.com/llcubnch6T.exe, 00000000.00000003.382515419.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.383198382.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.383615585.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.382620508.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.383062477.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.383441888.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.383716381.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.382877880.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.382700986.0000000005F74000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comFllcubnch6T.exe, 00000000.00000003.380490931.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380611387.0000000005F70000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380236923.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380325146.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380749411.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380956167.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381059048.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381273773.0000000005F74000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.tiro.comslntllcubnch6T.exe, 00000000.00000003.374266055.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.374439978.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.374621756.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/arllcubnch6T.exe, 00000000.00000003.372828062.0000000005F71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comuetallcubnch6T.exe, 00000000.00000003.379851679.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380056944.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379770002.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379922349.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/h;llcubnch6T.exe, 00000000.00000003.376766485.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376932034.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376589985.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376612294.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376546388.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376677530.0000000005F74000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.founder.com.cn/cn/aj#Wllcubnch6T.exe, 00000000.00000003.372183289.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372085870.0000000005F78000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.carterandcone.comadDllcubnch6T.exe, 00000000.00000003.374008369.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.374159108.0000000005F79000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.374208532.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.373945445.0000000005F78000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/u-hE;llcubnch6T.exe, 00000000.00000003.376048892.0000000005F72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comionllcubnch6T.exe, 00000000.00000003.379374870.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379280133.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comL.TTFllcubnch6T.exe, 00000000.00000003.381774652.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380749411.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381516393.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.382095894.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380956167.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381656755.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381059048.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381273773.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381931622.0000000005F74000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/oillcubnch6T.exe, 00000000.00000003.376589985.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376392718.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376612294.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376304898.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376546388.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/jp/llcubnch6T.exe, 00000000.00000003.376099331.0000000005F71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comdllcubnch6T.exe, 00000000.00000003.379374870.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379622921.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379851679.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379548812.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379280133.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379770002.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379922349.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379140386.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.come.comllcubnch6T.exe, 00000000.00000003.379374870.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379622921.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379851679.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379548812.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379280133.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379770002.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379922349.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379140386.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://en.wllcubnch6T.exe, 00000000.00000003.370486654.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.370416567.0000000005F77000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comlllcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deCllcubnch6T.exe, 00000000.00000003.378274559.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378415798.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378491515.0000000005F72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/llcubnch6T.exe, 00000000.00000003.372828062.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372078011.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNllcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.sakkal.com0llcubnch6T.exe, 00000000.00000003.376677530.0000000005F74000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.founder.com.cn/cnllcubnch6T.exe, 00000000.00000003.372828062.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372581826.0000000005F78000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372713612.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.372553600.0000000005F78000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.goodfont.co.krtpllcubnch6T.exe, 00000000.00000003.371976372.0000000005F70000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-jones.htmlllcubnch6T.exe, 00000000.00000003.379622921.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379851679.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380056944.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.379770002.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.coma;llcubnch6T.exe, 00000000.00000003.380490931.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380325146.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.urwpp.deo$llcubnch6T.exe, 00000000.00000003.378274559.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378415798.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.378491515.0000000005F72000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.jiyu-kobo.co.jp/llcubnch6T.exe, 00000000.00000003.376677530.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.377578464.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.376099331.0000000005F71000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comcetoS;llcubnch6T.exe, 00000000.00000003.386884447.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.386656862.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.413372395.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.386539619.0000000005F74000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.zhongyicts.com.cno.llcubnch6T.exe, 00000000.00000003.373754624.0000000005F78000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8llcubnch6T.exe, 00000000.00000002.432126891.0000000007252000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.comalicllcubnch6T.exe, 00000000.00000003.380611387.0000000005F70000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380749411.0000000005F72000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381516393.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.380956167.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381059048.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.381273773.0000000005F74000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comav;llcubnch6T.exe, 00000000.00000003.386884447.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.386656862.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.413372395.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.386539619.0000000005F74000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  http://www.galapagosdesign.com/Z;llcubnch6T.exe, 00000000.00000003.382515419.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.382620508.0000000005F74000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.382700986.0000000005F74000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.zhongyicts.com.cno.fllcubnch6T.exe, 00000000.00000003.373754624.0000000005F78000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/de-dllcubnch6T.exe, 00000000.00000003.375863348.0000000005F73000.00000004.00000800.00020000.00000000.sdmp, llcubnch6T.exe, 00000000.00000003.375712201.0000000005F73000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  91.193.75.135
                                  unknownSerbia
                                  209623DAVID_CRAIGGGfalse
                                  Joe Sandbox Version:35.0.0 Citrine
                                  Analysis ID:679479
                                  Start date and time: 05/08/202221:06:112022-08-05 21:06:11 +02:00
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 8m 20s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Sample file name:llcubnch6T (renamed file extension from none to exe)
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:26
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@9/8@0/1
                                  EGA Information:
                                  • Successful, ratio: 50%
                                  HDC Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 33
                                  • Number of non-executed functions: 1
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                  • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                  • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                                  • Execution Graph export aborted for target llcubnch6T.exe, PID 3720 because it is empty
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  21:07:33API Interceptor1x Sleep call for process: llcubnch6T.exe modified
                                  21:07:40API Interceptor40x Sleep call for process: powershell.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  91.193.75.135ctf.exeGet hashmaliciousBrowse
                                    triage_dropped_file.exeGet hashmaliciousBrowse
                                      2pxF82FZZh.exeGet hashmaliciousBrowse
                                        ORDER SPECIFICATION.jsGet hashmaliciousBrowse
                                          COMPANY PROFILE.jsGet hashmaliciousBrowse
                                            Qk1i28TfVz.exeGet hashmaliciousBrowse
                                              ORDER UPDATES-01-02-2022.ihz.exeGet hashmaliciousBrowse
                                                Dc4FQtO5Sr.exeGet hashmaliciousBrowse
                                                  Sathya Raj-CV.exeGet hashmaliciousBrowse
                                                    Z2S2dzpoGP.exeGet hashmaliciousBrowse
                                                      WSb9Mi1684.exeGet hashmaliciousBrowse
                                                        GWwW938Bot.exeGet hashmaliciousBrowse
                                                          Specification_2022.doc__.rtfGet hashmaliciousBrowse
                                                            Specification_2022.docGet hashmaliciousBrowse
                                                              swift-copy-TT.exeGet hashmaliciousBrowse
                                                                5309,pdf.exeGet hashmaliciousBrowse
                                                                  5309,pdf.exeGet hashmaliciousBrowse
                                                                    Confirmation transfer note Mt103-Ref#889278912.exeGet hashmaliciousBrowse
                                                                      Dringende RFQ_AP65425652_032421,pdf.exeGet hashmaliciousBrowse
                                                                        Confirmation Transfer Note MT103 Ref#58389262.exeGet hashmaliciousBrowse
                                                                          No context
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                          DAVID_CRAIGGGu0yd8ViwA4.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.61
                                                                          Payment Receipt.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.61
                                                                          augyQqseeo.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.61
                                                                          SecuriteInfo.com.Variant.Barys.11488.19269.exeGet hashmaliciousBrowse
                                                                          • 91.193.75.131
                                                                          bDTC.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.76
                                                                          Payment confirmation.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.61
                                                                          bDNT.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.76
                                                                          bDN3.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.76
                                                                          bDKh.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.76
                                                                          Invoice.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.61
                                                                          W6qyjSxlRB.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.12
                                                                          Proof of Payment.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.154
                                                                          ProofOfPayment.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.154
                                                                          Faktura 9382022.vbsGet hashmaliciousBrowse
                                                                          • 185.140.53.130
                                                                          XmKeaMRPzV.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.69
                                                                          bDE8.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.159
                                                                          4RfxmwlHnc.exeGet hashmaliciousBrowse
                                                                          • 91.193.75.211
                                                                          bDC7.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.159
                                                                          bDC9.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.159
                                                                          bDCA.exeGet hashmaliciousBrowse
                                                                          • 185.140.53.159
                                                                          No context
                                                                          No context
                                                                          Process:C:\Users\user\Desktop\llcubnch6T.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:modified
                                                                          Size (bytes):1394
                                                                          Entropy (8bit):5.340883346054895
                                                                          Encrypted:false
                                                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4bE4KnKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84F0:MIHK5HKXE1qHbHKnYHKhQnoPtHoxHhAR
                                                                          MD5:B51A52A837298BCF7A6EB58551AEF99C
                                                                          SHA1:61EEFCC20AC255B8651769E5C48E27B2A983FC4A
                                                                          SHA-256:1D393FBB3CE754EA699462C2778587A7F2451EB23BE2BD5084C95A46B20BE8AF
                                                                          SHA-512:138544399787651C847837719606197E539857206CCB271E0F4A86E2017FBADABADF5A235B6F6F1DA8ADE7EF29DBA3115CD1996AD01F92CA30C57D0BF217C11C
                                                                          Malicious:true
                                                                          Reputation:moderate, very likely benign file
                                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e08
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):22272
                                                                          Entropy (8bit):5.600170087985691
                                                                          Encrypted:false
                                                                          SSDEEP:384:ntCDDq0C6VKa/G/KBJYSB+sjultI+b7Y9g9SJ3xa1BMrm7Z1AV7Dw64I+iyYB:va/QOY4dClth79cBa4+M
                                                                          MD5:E6BC308E44F52713322480EE725334CB
                                                                          SHA1:57423595B636FC70CF53EB29D227CB6B9BC42F8E
                                                                          SHA-256:C581CF1C3C82F6B2DF7CD852361A0466AC85172BEC6E34D9655A6C18667BBEC7
                                                                          SHA-512:E4904783464A21408255C32364441F3741BF9544182F57CF7A14946E6AFC100F16D8CF3089F155AA4A08E4E65FF246F20517C7E1FE6DB962801CC6619ADBE19D
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:@...e...........y...................>.y..............@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:very short file (no magic)
                                                                          Category:dropped
                                                                          Size (bytes):1
                                                                          Entropy (8bit):0.0
                                                                          Encrypted:false
                                                                          SSDEEP:3:U:U
                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                          Malicious:false
                                                                          Reputation:high, very likely benign file
                                                                          Preview:1
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:very short file (no magic)
                                                                          Category:dropped
                                                                          Size (bytes):1
                                                                          Entropy (8bit):0.0
                                                                          Encrypted:false
                                                                          SSDEEP:3:U:U
                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                          Malicious:false
                                                                          Preview:1
                                                                          Process:C:\Users\user\Desktop\llcubnch6T.exe
                                                                          File Type:XML 1.0 document, ASCII text
                                                                          Category:dropped
                                                                          Size (bytes):1608
                                                                          Entropy (8bit):5.124455319747427
                                                                          Encrypted:false
                                                                          SSDEEP:24:2di4+S2qh/S1K2ky1mo2dUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtLPaxvn:cgea6YrFdOFzOzN33ODOiDdKrsuTzuv
                                                                          MD5:0E2E547022BB8168544A3BD4F03B80DF
                                                                          SHA1:231F190A8B0CE5A7C8BE4346172F48D342B44234
                                                                          SHA-256:7B1A5B157DD8468BA308482C17F6451096304542DCAA29CF568026DCF494BC60
                                                                          SHA-512:2FE546649789F3022A8E3606F21199FCFCDBB0E493830556B87D9887A61717D65C2E3A763DF805216320D1A08A2408CCF00F714D212268E5B049940BE2A03BDF
                                                                          Malicious:true
                                                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailab
                                                                          Process:C:\Users\user\Desktop\llcubnch6T.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):621056
                                                                          Entropy (8bit):7.267556524859017
                                                                          Encrypted:false
                                                                          SSDEEP:12288:4H2iNSg6SKlpxxDAE7Mn3cs9OWvHoFiPEwjlk2Y/gbb:81SLlpxx8EEc85oFaj22p
                                                                          MD5:44E407B3DE4A9865AB747BDCA810B0B9
                                                                          SHA1:6EB199E6837432D8ACB98C03B22277F340726372
                                                                          SHA-256:DA6ABB6F3AAE250D50ED09B6EACC267C33E50895E3EBD7E6BA800AB018351EC5
                                                                          SHA-512:DB8E1652A6E8D90450114641F3573B9423BCE4C27C237AF49A59DC44ACF929580CDF59E5C216391EF87C27C52FC610653D19BCE2D1507E4D8F310B7D6DEE8A4B
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          • Antivirus: ReversingLabs, Detection: 54%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....s.b..............0..r..........b.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...hq... ...r.................. ..`.rsrc................t..............@..@.reloc...............x..............@..B................D.......H............S......B.......@...........................................^..}.....(.......(.....*.0..+.........,..{.......+....,...{....o........(.....*..0................(....s......s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....{....o......{....o......(......{.....o .....{....o!...."...Bs"...o#...&.{....o!...."...Bs"...o#...&.{....o$....{......o%.....{....o$....{......o%.....{....o$....{......o%.....{....o$....{......o%.....{....o$...
                                                                          Process:C:\Users\user\Desktop\llcubnch6T.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):26
                                                                          Entropy (8bit):3.95006375643621
                                                                          Encrypted:false
                                                                          SSDEEP:3:ggPYV:rPYV
                                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                          Malicious:true
                                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):5815
                                                                          Entropy (8bit):5.37547468273822
                                                                          Encrypted:false
                                                                          SSDEEP:96:BZDTL5NKCqDo1ZSGZiTL5NKCqDo1ZE39PjZiTL5NKCqDo1ZEG//hZ+:7
                                                                          MD5:599FC2C562BB7B72B0592FCDFA20F17F
                                                                          SHA1:22D5820DE1296A150D38D950EFE7540DEF5672C1
                                                                          SHA-256:227A4D6538B52B6061A7960A5F9B9795AB1773C2752EEF201CFCD5B85E38E274
                                                                          SHA-512:C95070EF3920CCAC7689EB27A953C13DAE36173DF17D36194D0BBA930BC0FDFA470C559EE5713F53D2EF26D0D9F1107079E710A8DE326EA3E6AF045BAE1CB99D
                                                                          Malicious:false
                                                                          Preview:.**********************..Windows PowerShell transcript start..Start time: 20220805210740..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 724471 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\RhFYnHFgJ.exe..Process ID: 5040..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220805210740..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\RhFYnHFgJ.exe..**********************..Windows PowerShell transcript start..Start time: 20220805211241..Username: computer\user..RunAs User: DESKTOP
                                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Entropy (8bit):7.267556524859017
                                                                          TrID:
                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                          • DOS Executable Generic (2002/1) 0.01%
                                                                          File name:llcubnch6T.exe
                                                                          File size:621056
                                                                          MD5:44e407b3de4a9865ab747bdca810b0b9
                                                                          SHA1:6eb199e6837432d8acb98c03b22277f340726372
                                                                          SHA256:da6abb6f3aae250d50ed09b6eacc267c33e50895e3ebd7e6ba800ab018351ec5
                                                                          SHA512:db8e1652a6e8d90450114641f3573b9423bce4c27c237af49a59dc44acf929580cdf59e5c216391ef87c27c52fc610653d19bce2d1507e4d8f310b7d6dee8a4b
                                                                          SSDEEP:12288:4H2iNSg6SKlpxxDAE7Mn3cs9OWvHoFiPEwjlk2Y/gbb:81SLlpxx8EEc85oFaj22p
                                                                          TLSH:52D4E082F2694F5BC0274BF9AC2594581727B39E503DD6096DFEB8EBA0727C34152E0B
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....s.b..............0..r..........b.... ........@.. ....................................@................................
                                                                          Icon Hash:00828e8e8686b000
                                                                          Entrypoint:0x499162
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x62E773E6 [Mon Aug 1 06:34:14 2022 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:4
                                                                          OS Version Minor:0
                                                                          File Version Major:4
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:4
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                          Instruction
                                                                          jmp dword ptr [00402000h]
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x991100x4f.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x9a0000x3a8.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x9c0000xc.reloc
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x20000x971680x97200False0.7348273366418527data7.2738007120716635IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rsrc0x9a0000x3a80x400False0.38671875data2.9730132767456556IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .reloc0x9c0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountry
                                                                          RT_VERSION0x9a0580x34cdata
                                                                          DLLImport
                                                                          mscoree.dll_CorExeMain
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Aug 5, 2022 21:07:53.229300022 CEST497653030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:07:53.269311905 CEST30304976591.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:07:53.830010891 CEST497653030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:07:53.869882107 CEST30304976591.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:07:54.523250103 CEST497653030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:07:54.563241959 CEST30304976591.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:07:59.581712961 CEST497773030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:07:59.621660948 CEST30304977791.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:00.129159927 CEST497773030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:00.169723034 CEST30304977791.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:00.674324989 CEST497773030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:00.714421988 CEST30304977791.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:05.723584890 CEST497793030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:05.763652086 CEST30304977991.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:06.268538952 CEST497793030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:06.308541059 CEST30304977991.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:06.815474033 CEST497793030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:06.858010054 CEST30304977991.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:11.866844893 CEST497843030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:11.907004118 CEST30304978491.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:12.534842014 CEST497843030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:12.575058937 CEST30304978491.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:13.222290993 CEST497843030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:13.262275934 CEST30304978491.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:18.270786047 CEST497873030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:18.311213017 CEST30304978791.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:18.832133055 CEST497873030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:18.872239113 CEST30304978791.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:19.439817905 CEST497873030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:19.479929924 CEST30304978791.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:24.489988089 CEST497943030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:24.530139923 CEST30304979491.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:25.035784960 CEST497943030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:25.075980902 CEST30304979491.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:25.582756996 CEST497943030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:25.622864962 CEST30304979491.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:30.632461071 CEST497973030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:30.672374010 CEST30304979791.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:31.223885059 CEST497973030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:31.263833046 CEST30304979791.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:31.926997900 CEST497973030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:31.967113018 CEST30304979791.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:36.977118015 CEST497983030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:37.017225027 CEST30304979891.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:37.615282059 CEST497983030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:37.655406952 CEST30304979891.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:38.161915064 CEST497983030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:38.202013016 CEST30304979891.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:43.210587025 CEST498003030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:43.250809908 CEST30304980091.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:43.756254911 CEST498003030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:43.796329021 CEST30304980091.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:44.459325075 CEST498003030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:44.499526024 CEST30304980091.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:49.509156942 CEST498163030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:49.549237013 CEST30304981691.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:50.148332119 CEST498163030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:50.188297033 CEST30304981691.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:50.750245094 CEST498163030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:50.790303946 CEST30304981691.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:55.806442976 CEST498453030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:55.846424103 CEST30304984591.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:56.360430002 CEST498453030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:56.400496960 CEST30304984591.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:08:56.962353945 CEST498453030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:08:57.002532959 CEST30304984591.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:09:02.585449934 CEST498543030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:09:02.625430107 CEST30304985491.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:09:03.259737968 CEST498543030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:09:03.299568892 CEST30304985491.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:09:03.947386980 CEST498543030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:09:03.987705946 CEST30304985491.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:09:08.997055054 CEST498593030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:09:09.038681984 CEST30304985991.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:09:09.541527033 CEST498593030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:09:09.581378937 CEST30304985991.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:09:10.088469982 CEST498593030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:09:10.128552914 CEST30304985991.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:09:15.136780977 CEST498703030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:09:15.176758051 CEST30304987091.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:09:15.682686090 CEST498703030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:09:15.722548962 CEST30304987091.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:09:16.229609013 CEST498703030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:09:16.269427061 CEST30304987091.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:09:21.278151035 CEST498833030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:09:21.318515062 CEST30304988391.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:09:21.855076075 CEST498833030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:09:21.895132065 CEST30304988391.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:09:22.558250904 CEST498833030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:09:22.598500967 CEST30304988391.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:09:27.606158018 CEST498853030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:09:27.646354914 CEST30304988591.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:09:28.152470112 CEST498853030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:09:28.192559004 CEST30304988591.193.75.135192.168.2.6
                                                                          Aug 5, 2022 21:09:28.699387074 CEST498853030192.168.2.691.193.75.135
                                                                          Aug 5, 2022 21:09:28.739516973 CEST30304988591.193.75.135192.168.2.6

                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:21:07:20
                                                                          Start date:05/08/2022
                                                                          Path:C:\Users\user\Desktop\llcubnch6T.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\llcubnch6T.exe"
                                                                          Imagebase:0xa30000
                                                                          File size:621056 bytes
                                                                          MD5 hash:44E407B3DE4A9865AB747BDCA810B0B9
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.418726957.0000000003063000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.419146088.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.419146088.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                          Reputation:low

                                                                          Target ID:5
                                                                          Start time:21:07:36
                                                                          Start date:05/08/2022
                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RhFYnHFgJ.exe
                                                                          Imagebase:0xf10000
                                                                          File size:430592 bytes
                                                                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Reputation:high

                                                                          Target ID:6
                                                                          Start time:21:07:37
                                                                          Start date:05/08/2022
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff6406f0000
                                                                          File size:625664 bytes
                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          Target ID:7
                                                                          Start time:21:07:37
                                                                          Start date:05/08/2022
                                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RhFYnHFgJ" /XML "C:\Users\user\AppData\Local\Temp\tmp95A0.tmp
                                                                          Imagebase:0x290000
                                                                          File size:185856 bytes
                                                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          Target ID:8
                                                                          Start time:21:07:39
                                                                          Start date:05/08/2022
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff6406f0000
                                                                          File size:625664 bytes
                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          Target ID:9
                                                                          Start time:21:07:42
                                                                          Start date:05/08/2022
                                                                          Path:C:\Users\user\Desktop\llcubnch6T.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Users\user\Desktop\llcubnch6T.exe
                                                                          Imagebase:0xce0000
                                                                          File size:621056 bytes
                                                                          MD5 hash:44E407B3DE4A9865AB747BDCA810B0B9
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Yara matches:
                                                                          • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000009.00000002.630822289.0000000003051000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000009.00000000.410857927.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000009.00000000.410857927.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                          • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000009.00000002.635757563.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                          Reputation:low

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:13%
                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                            Signature Coverage:0%
                                                                            Total number of Nodes:154
                                                                            Total number of Limit Nodes:8
                                                                            execution_graph 15555 5f0a1a0 15556 5f0a1ee DrawTextExW 15555->15556 15558 5f0a246 15556->15558 15559 10b5798 15560 10b57b4 15559->15560 15563 10b57f5 15560->15563 15565 10b5af9 15560->15565 15562 10b585d 15563->15562 15570 10b5280 15563->15570 15566 10b5b1d 15565->15566 15574 10b5be8 15566->15574 15578 10b5bf8 15566->15578 15571 10b528b 15570->15571 15586 10b6dd0 15571->15586 15573 10b8404 15573->15563 15576 10b5bf8 15574->15576 15575 10b5cfc 15575->15575 15576->15575 15582 10b543c 15576->15582 15579 10b5c1f 15578->15579 15580 10b543c CreateActCtxA 15579->15580 15581 10b5cfc 15579->15581 15580->15581 15583 10b7088 CreateActCtxA 15582->15583 15585 10b714b 15583->15585 15585->15585 15587 10b6ddb 15586->15587 15590 10b6df0 15587->15590 15589 10b84f5 15589->15573 15591 10b6dfb 15590->15591 15594 10b6e20 15591->15594 15593 10b85da 15593->15589 15595 10b6e2b 15594->15595 15598 10b6e50 15595->15598 15597 10b86ca 15597->15593 15599 10b6e5b 15598->15599 15601 10b8dde 15599->15601 15605 10bafa2 15599->15605 15600 10b8e1c 15600->15597 15601->15600 15611 10bd0f0 15601->15611 15616 10bd100 15601->15616 15606 10bafaa 15605->15606 15608 10bb01d 15605->15608 15621 10bafd8 15606->15621 15625 10bafc7 15606->15625 15607 10bafb6 15607->15601 15608->15601 15612 10bd121 15611->15612 15613 10bd145 15612->15613 15655 10bd2a0 15612->15655 15659 10bd2b0 15612->15659 15613->15600 15617 10bd121 15616->15617 15618 10bd145 15617->15618 15619 10bd2a0 3 API calls 15617->15619 15620 10bd2b0 3 API calls 15617->15620 15618->15600 15619->15618 15620->15618 15630 10bb0c0 15621->15630 15635 10bb0d0 15621->15635 15622 10bafe7 15622->15607 15626 10bafd3 15625->15626 15627 10bafe7 15625->15627 15628 10bb0c0 GetModuleHandleW 15626->15628 15629 10bb0d0 2 API calls 15626->15629 15627->15607 15628->15627 15629->15627 15632 10bb0c3 15630->15632 15631 10bb0f9 15631->15622 15632->15631 15633 10bb2f8 GetModuleHandleW 15632->15633 15634 10bb325 15633->15634 15634->15622 15636 10bb0e3 15635->15636 15637 10bb0fb 15636->15637 15643 10bb348 15636->15643 15647 10bb358 15636->15647 15637->15622 15638 10bb2f8 GetModuleHandleW 15640 10bb325 15638->15640 15639 10bb0f3 15639->15637 15639->15638 15640->15622 15644 10bb34d 15643->15644 15646 10bb391 15644->15646 15651 10bab28 15644->15651 15646->15639 15648 10bb36c 15647->15648 15649 10bb391 15648->15649 15650 10bab28 LoadLibraryExW 15648->15650 15649->15639 15650->15649 15652 10bb538 LoadLibraryExW 15651->15652 15654 10bb5b1 15652->15654 15654->15646 15657 10bd2bd 15655->15657 15656 10bd2f7 15656->15613 15657->15656 15663 10bcb74 15657->15663 15660 10bd2bd 15659->15660 15661 10bd2f7 15660->15661 15662 10bcb74 3 API calls 15660->15662 15661->15613 15662->15661 15664 10bcb7f 15663->15664 15666 10bdbe8 15664->15666 15667 10bcc5c 15664->15667 15666->15666 15668 10bcc67 15667->15668 15669 10b6e50 3 API calls 15668->15669 15670 10bdc57 15669->15670 15674 10bf9a0 15670->15674 15679 10bf9b8 15670->15679 15671 10bdc90 15671->15666 15675 10bf9b8 15674->15675 15676 10bf9f5 15675->15676 15677 10bfe28 LoadLibraryExW GetModuleHandleW 15675->15677 15678 10bfe38 LoadLibraryExW GetModuleHandleW 15675->15678 15676->15671 15677->15676 15678->15676 15681 10bf9e9 15679->15681 15682 10bfa35 15679->15682 15680 10bf9f5 15680->15671 15681->15680 15683 10bfe28 LoadLibraryExW GetModuleHandleW 15681->15683 15684 10bfe38 LoadLibraryExW GetModuleHandleW 15681->15684 15682->15671 15683->15682 15684->15682 15685 5f04168 15686 5f041a1 15685->15686 15687 10bafa2 3 API calls 15685->15687 15687->15686 15688 5f0e068 15690 10bafa2 3 API calls 15688->15690 15689 5f0e0ab 15690->15689 15691 10b44d0 15692 10b44e4 15691->15692 15693 10b44ed 15692->15693 15695 10b470a 15692->15695 15702 10b4968 15695->15702 15707 10b4906 15695->15707 15711 10b47f0 15695->15711 15715 10b47e0 15695->15715 15719 10b48ec 15695->15719 15696 10b4713 15696->15693 15703 10b496e 15702->15703 15723 10b4e9f 15703->15723 15727 10b4eb0 15703->15727 15704 10b4980 15704->15696 15708 10b4919 15707->15708 15709 10b492b 15707->15709 15735 10b4be7 15708->15735 15712 10b4834 15711->15712 15713 10b492b 15712->15713 15714 10b4be7 2 API calls 15712->15714 15714->15713 15716 10b4834 15715->15716 15717 10b492b 15716->15717 15718 10b4be7 2 API calls 15716->15718 15718->15717 15720 10b489f 15719->15720 15721 10b492b 15720->15721 15722 10b4be7 2 API calls 15720->15722 15722->15721 15724 10b4eb0 15723->15724 15731 10b4ee8 15724->15731 15725 10b4ece 15725->15704 15728 10b4ebe 15727->15728 15730 10b4ee8 RtlEncodePointer 15728->15730 15729 10b4ece 15729->15704 15730->15729 15732 10b4f31 15731->15732 15733 10b4f80 15732->15733 15734 10b4f57 RtlEncodePointer 15732->15734 15733->15725 15734->15733 15736 10b4c06 15735->15736 15740 10b4c48 15736->15740 15744 10b4c37 15736->15744 15737 10b4c16 15737->15709 15741 10b4c82 15740->15741 15742 10b4cac RtlEncodePointer 15741->15742 15743 10b4cd5 15741->15743 15742->15743 15743->15737 15745 10b4c48 15744->15745 15746 10b4cac RtlEncodePointer 15745->15746 15747 10b4cd5 15745->15747 15746->15747 15747->15737 15748 10bd5f0 DuplicateHandle 15749 10bd686 15748->15749
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.414691907.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10b0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1f4a5810f107968fa0fcdede62917f68e1a13d9854003fdcc4cb599757c42602
                                                                            • Instruction ID: b6ded737464fc985a3c32dbc0cea175b0c526e562ccbb4842f95da45dc70f1cc
                                                                            • Opcode Fuzzy Hash: 1f4a5810f107968fa0fcdede62917f68e1a13d9854003fdcc4cb599757c42602
                                                                            • Instruction Fuzzy Hash: 8681E470E01248CFDB14DFE5D894AEEBBF2EF8A305F149069D419AB364DB34A846CB54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 010BB316
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.414691907.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10b0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID: HandleModule
                                                                            • String ID:
                                                                            • API String ID: 4139908857-0
                                                                            • Opcode ID: 5024bbc463e401698a6b6af57af7f23225b3719c020d6aa1fa2701ab4b183123
                                                                            • Instruction ID: 496cff362784ab09844967d9348066357e4d83375bd5ee6f0cf9460fcc1148d3
                                                                            • Opcode Fuzzy Hash: 5024bbc463e401698a6b6af57af7f23225b3719c020d6aa1fa2701ab4b183123
                                                                            • Instruction Fuzzy Hash: 5B713270A00B058FD764DF6AD49479BBBF5FF88204F008A2DD58ADBB40DB74E8498B91
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 56 10b543c-10b7149 CreateActCtxA 59 10b714b-10b7151 56->59 60 10b7152-10b71ac 56->60 59->60 67 10b71bb-10b71bf 60->67 68 10b71ae-10b71b1 60->68 69 10b71c1-10b71cd 67->69 70 10b71d0 67->70 68->67 69->70 72 10b71d1 70->72 72->72
                                                                            APIs
                                                                            • CreateActCtxA.KERNEL32(?), ref: 010B7139
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.414691907.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10b0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID: Create
                                                                            • String ID:
                                                                            • API String ID: 2289755597-0
                                                                            • Opcode ID: 1f8372dccd9be82913fb3a725b69b4817976f3c179cb0bfaa1464491eb27d3ba
                                                                            • Instruction ID: 47389cadfcbafbe578b799764c82bedb4267876fc7234c195cbfecd8a953e579
                                                                            • Opcode Fuzzy Hash: 1f8372dccd9be82913fb3a725b69b4817976f3c179cb0bfaa1464491eb27d3ba
                                                                            • Instruction Fuzzy Hash: 9F41E371C4061DCBDB24DFA9C884BDEBBB5FF88304F20846AD449AB251DB75594ACFA0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 73 10b707d-10b7149 CreateActCtxA 75 10b714b-10b7151 73->75 76 10b7152-10b71ac 73->76 75->76 83 10b71bb-10b71bf 76->83 84 10b71ae-10b71b1 76->84 85 10b71c1-10b71cd 83->85 86 10b71d0 83->86 84->83 85->86 88 10b71d1 86->88 88->88
                                                                            APIs
                                                                            • CreateActCtxA.KERNEL32(?), ref: 010B7139
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.414691907.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10b0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID: Create
                                                                            • String ID:
                                                                            • API String ID: 2289755597-0
                                                                            • Opcode ID: 5b4b98064e0ad3e529399ee5f1bbf4bd02663b06a6219b727329ac4df0bfbde6
                                                                            • Instruction ID: 13e76bca4f88936ed636c411f3f6921c80cbe3e86084f5911aa94190835b13ae
                                                                            • Opcode Fuzzy Hash: 5b4b98064e0ad3e529399ee5f1bbf4bd02663b06a6219b727329ac4df0bfbde6
                                                                            • Instruction Fuzzy Hash: 1841F271C00719CBDB24CFA9C8847DEBBB5BF88304F20846AD449AB251DB75594ACFA0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 89 5f0a1a0-5f0a1ec 90 5f0a1f7-5f0a206 89->90 91 5f0a1ee-5f0a1f4 89->91 92 5f0a208 90->92 93 5f0a20b-5f0a244 DrawTextExW 90->93 91->90 92->93 94 5f0a246-5f0a24c 93->94 95 5f0a24d-5f0a26a 93->95 94->95
                                                                            APIs
                                                                            • DrawTextExW.USER32(?,?,?,?,?,?), ref: 05F0A237
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.427195484.0000000005F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F00000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5f00000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID: DrawText
                                                                            • String ID:
                                                                            • API String ID: 2175133113-0
                                                                            • Opcode ID: 92d8a8ed914fe67a1bf9594c104fc6affbdbf254bd0a41681b2b90f0a3bb00d8
                                                                            • Instruction ID: f19af2e7261d5d26233e30d9d688ac9bfca04fc2f1c0445ed09f0a908b8913c9
                                                                            • Opcode Fuzzy Hash: 92d8a8ed914fe67a1bf9594c104fc6affbdbf254bd0a41681b2b90f0a3bb00d8
                                                                            • Instruction Fuzzy Hash: D021E3B5D003499FCB10CF9AD880ADEFBF4BB48324F14842AE819A7350D774A984CFA0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 98 10bd5e8-10bd5ea 99 10bd5f0-10bd684 DuplicateHandle 98->99 100 10bd68d-10bd6aa 99->100 101 10bd686-10bd68c 99->101 101->100
                                                                            APIs
                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010BD677
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.414691907.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10b0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID: DuplicateHandle
                                                                            • String ID:
                                                                            • API String ID: 3793708945-0
                                                                            • Opcode ID: e2ce7bfa2a151b90bfd65f4de528e97b6d34291d86a33a4e7f80ca3f6bfb2f9d
                                                                            • Instruction ID: a3580ef13e23ed83fdcf789b3e6f7eaf33d9260dc604290e590fa05fa17ac2b2
                                                                            • Opcode Fuzzy Hash: e2ce7bfa2a151b90bfd65f4de528e97b6d34291d86a33a4e7f80ca3f6bfb2f9d
                                                                            • Instruction Fuzzy Hash: B421E6B59002089FDB10CFDAD984ADEFBF4EB48324F14841AE958A3310D378A954CF61
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 104 10bd5f0-10bd684 DuplicateHandle 105 10bd68d-10bd6aa 104->105 106 10bd686-10bd68c 104->106 106->105
                                                                            APIs
                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010BD677
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.414691907.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10b0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID: DuplicateHandle
                                                                            • String ID:
                                                                            • API String ID: 3793708945-0
                                                                            • Opcode ID: 3a024e58d39511916c71be80578657f1fe39de551ef6370076d55046092a9f9b
                                                                            • Instruction ID: d824daf9a99cc89990ff318755f8dbb2823596d07f43e63f3e6f62156a24d483
                                                                            • Opcode Fuzzy Hash: 3a024e58d39511916c71be80578657f1fe39de551ef6370076d55046092a9f9b
                                                                            • Instruction Fuzzy Hash: 9521D8B59012099FDB10CFDAD984ADEFBF4FB48324F14841AE958A3310D774A954CF61
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 109 10b4c37-10b4c8a 113 10b4c8c-10b4c8e 109->113 114 10b4c90 109->114 115 10b4c95-10b4ca0 113->115 114->115 116 10b4ca2-10b4cd3 RtlEncodePointer 115->116 117 10b4d01-10b4d0e 115->117 119 10b4cdc-10b4cfc 116->119 120 10b4cd5-10b4cdb 116->120 119->117 120->119
                                                                            APIs
                                                                            • RtlEncodePointer.NTDLL(00000000), ref: 010B4CC2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.414691907.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10b0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID: EncodePointer
                                                                            • String ID:
                                                                            • API String ID: 2118026453-0
                                                                            • Opcode ID: 5f37fcb0c57cae226b25725d0f3f58bbc51518fb0d7bd3e12a474fb38529616f
                                                                            • Instruction ID: 60d4593d79ec56ae9f3d0882d453a1340a76734d67bfdfc1f9a2cf285af18f27
                                                                            • Opcode Fuzzy Hash: 5f37fcb0c57cae226b25725d0f3f58bbc51518fb0d7bd3e12a474fb38529616f
                                                                            • Instruction Fuzzy Hash: 6A21CD708402088FDB50DFA9C5487DABBF8FB09318F10882DC445E7602C7396A488FA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 122 10b4ee8-10b4f38 call 10b4d20 call 10b4d78 127 10b4f3a-10b4f3c 122->127 128 10b4f3e 122->128 129 10b4f43-10b4f4b 127->129 128->129 130 10b4f4d-10b4f7e RtlEncodePointer 129->130 131 10b4fa7-10b4fb9 129->131 133 10b4f80-10b4f86 130->133 134 10b4f87-10b4f9d 130->134 133->134 134->131
                                                                            APIs
                                                                            • RtlEncodePointer.NTDLL(00000000), ref: 010B4F6D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.414691907.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10b0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID: EncodePointer
                                                                            • String ID:
                                                                            • API String ID: 2118026453-0
                                                                            • Opcode ID: 024155a95f2db88e2fe125fe4bb5e01a7d69b88d4a9b1df77cd03a62a4c3f018
                                                                            • Instruction ID: ed60e75604d3e38f763cebbb42e9c3d110ba47fb37c61437098ed0ede77da2fb
                                                                            • Opcode Fuzzy Hash: 024155a95f2db88e2fe125fe4bb5e01a7d69b88d4a9b1df77cd03a62a4c3f018
                                                                            • Instruction Fuzzy Hash: C2218CB1D403498FDB60DF99D5897DABBF8EB18358F10481DD455F3202D778A684CBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 136 10bab28-10bb578 139 10bb57a-10bb57d 136->139 140 10bb580-10bb5af LoadLibraryExW 136->140 139->140 141 10bb5b8-10bb5d5 140->141 142 10bb5b1-10bb5b7 140->142 142->141
                                                                            APIs
                                                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,010BB391,00000800,00000000,00000000), ref: 010BB5A2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.414691907.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10b0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad
                                                                            • String ID:
                                                                            • API String ID: 1029625771-0
                                                                            • Opcode ID: c04aded0a9496f1e16d8090accc2ea48fa0d7eea83a6590adc8b2b2167d8fc5b
                                                                            • Instruction ID: f52536ec641cca5964594106c9fdaf48190ce18800b87436bf26d815f645a162
                                                                            • Opcode Fuzzy Hash: c04aded0a9496f1e16d8090accc2ea48fa0d7eea83a6590adc8b2b2167d8fc5b
                                                                            • Instruction Fuzzy Hash: 061117B29002099FDB10CF9AD484BDEFBF4EB48324F14841ED955A7700C774A549CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 145 10bb530-10bb531 146 10bb533-10bb55e 145->146 147 10bb561-10bb578 145->147 146->147 148 10bb57a-10bb57d 147->148 149 10bb580-10bb5af LoadLibraryExW 147->149 148->149 151 10bb5b8-10bb5d5 149->151 152 10bb5b1-10bb5b7 149->152 152->151
                                                                            APIs
                                                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,010BB391,00000800,00000000,00000000), ref: 010BB5A2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.414691907.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10b0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad
                                                                            • String ID:
                                                                            • API String ID: 1029625771-0
                                                                            • Opcode ID: f138bdb6ee32191ea295946b7238a575dcaf398467ff37daeb9f833479af4987
                                                                            • Instruction ID: 016facaa5fbc5dd6144ece95e433a7477aa450204050fdcf032163d0e2948238
                                                                            • Opcode Fuzzy Hash: f138bdb6ee32191ea295946b7238a575dcaf398467ff37daeb9f833479af4987
                                                                            • Instruction Fuzzy Hash: 451114B68002099FDB10CF9AC884BDEFBF8EB48324F14841AD559A7600D774A949CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 155 10b4c48-10b4c8a 158 10b4c8c-10b4c8e 155->158 159 10b4c90 155->159 160 10b4c95-10b4ca0 158->160 159->160 161 10b4ca2-10b4cd3 RtlEncodePointer 160->161 162 10b4d01-10b4d0e 160->162 164 10b4cdc-10b4cfc 161->164 165 10b4cd5-10b4cdb 161->165 164->162 165->164
                                                                            APIs
                                                                            • RtlEncodePointer.NTDLL(00000000), ref: 010B4CC2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.414691907.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10b0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID: EncodePointer
                                                                            • String ID:
                                                                            • API String ID: 2118026453-0
                                                                            • Opcode ID: 5c76cbf1a31bd68f5d90c4e5a8f7cb86b3e3aae1aa66185e5a439bd306229de8
                                                                            • Instruction ID: f6ac13d4dc08f75209cc8deb002fd3fa4cea473b33d14b2f5aaee6ca867cdca8
                                                                            • Opcode Fuzzy Hash: 5c76cbf1a31bd68f5d90c4e5a8f7cb86b3e3aae1aa66185e5a439bd306229de8
                                                                            • Instruction Fuzzy Hash: 291189709402098FDBA0EFA9D5487DABBF8FB09358F108429D445E7642CB396A848FA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 167 10bb2b0-10bb2f0 168 10bb2f8-10bb323 GetModuleHandleW 167->168 169 10bb2f2-10bb2f5 167->169 170 10bb32c-10bb340 168->170 171 10bb325-10bb32b 168->171 169->168 171->170
                                                                            APIs
                                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 010BB316
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.414691907.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10b0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID: HandleModule
                                                                            • String ID:
                                                                            • API String ID: 4139908857-0
                                                                            • Opcode ID: 20dd4bc0314370ec8266293c262c908b999b898824bed392212a1527ae39228f
                                                                            • Instruction ID: 880842694b241c5994e4ceef6d5f71db5a5bcee5eb7815cf1ddb077a41292439
                                                                            • Opcode Fuzzy Hash: 20dd4bc0314370ec8266293c262c908b999b898824bed392212a1527ae39228f
                                                                            • Instruction Fuzzy Hash: A01113B1C006498FDB10CF9AC484BDEFBF4EB49224F14841AD859B7600C378A549CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.414691907.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10b0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e445b55baaf88030f1149957493f4e3c6c732335db6c75f98df17cd7d3132a2d
                                                                            • Instruction ID: b458282d2eb6c68ad18f032bfbbba65a910c740e3e7348a963d259ac3639a20f
                                                                            • Opcode Fuzzy Hash: e445b55baaf88030f1149957493f4e3c6c732335db6c75f98df17cd7d3132a2d
                                                                            • Instruction Fuzzy Hash: 87A16E32E1021A8FCF19DFB5C8845DDBBF2FF89304B1585AAE905AB261DB31E955CB40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: ,$#Lk^
                                                                            • API String ID: 0-1543376746
                                                                            • Opcode ID: 582c3232e0a7b444ba87b475962464c3fe7d8a47ae3e179b1b807d01061228e2
                                                                            • Instruction ID: 827f5f0c5c63e5ed2388052ad818046f8c5f218ba9fbe4972caf7345cff96de3
                                                                            • Opcode Fuzzy Hash: 582c3232e0a7b444ba87b475962464c3fe7d8a47ae3e179b1b807d01061228e2
                                                                            • Instruction Fuzzy Hash: 16029D30600201CFDB14AF64D494AAEB7E2FF85708F11896CD4159F3A6DF799C8ACB91
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 116d5ea9f95be68675c38355fdcfb87bd0955b449a0ef1af5ad36d942d20f539
                                                                            • Instruction ID: 3e24f550815d1dd87e1d6a0a9e97491c21efcfc9be507682ac21e845d85a577b
                                                                            • Opcode Fuzzy Hash: 116d5ea9f95be68675c38355fdcfb87bd0955b449a0ef1af5ad36d942d20f539
                                                                            • Instruction Fuzzy Hash: 9F519C74B101149FCB44DF68C454AADBBF6BF89714F1580A9E406EF3A1CB789C068BA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c5ccb2909685820e0602efd7d6a7b6464484fa066db67dbe99ab255f6bbf917b
                                                                            • Instruction ID: f513eee62d45018302e1cb250e12310fbf85ecb646d9ef4616aeb6e6a2071c58
                                                                            • Opcode Fuzzy Hash: c5ccb2909685820e0602efd7d6a7b6464484fa066db67dbe99ab255f6bbf917b
                                                                            • Instruction Fuzzy Hash: 0041BE347002058FDB149FA8D454A9EBBF2BF89214F1485A9E105EF3A1CB78DC098BA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: de3b7128d404be8b6d40cdcc684221f7ca34144c4a5503e9dc9e8f04be559a11
                                                                            • Instruction ID: 203b09406284cf14da6242d6bf5a46bc826ad49f3c5ff42cd438db0692ba0546
                                                                            • Opcode Fuzzy Hash: de3b7128d404be8b6d40cdcc684221f7ca34144c4a5503e9dc9e8f04be559a11
                                                                            • Instruction Fuzzy Hash: 6A51E834611301CFCB55EF34E14589A776AFB85389351A939D811AB368EB3DAE4BCF80
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8df18520a6681c3a23b497ddc03bc38a841a19bb479c254207a13705f2857b7d
                                                                            • Instruction ID: 801a8dfa190b4af6dd281790f1b0e006217fd8ba917bf8626adcb7f8e65f6d15
                                                                            • Opcode Fuzzy Hash: 8df18520a6681c3a23b497ddc03bc38a841a19bb479c254207a13705f2857b7d
                                                                            • Instruction Fuzzy Hash: D531C271E001099FCB14EBB884112AEBBF6EFD9604F14856DD40ADB741DB38D9468BA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f340a314f26b042b5fad1aea8344e17fa9399b35e0b34e21c95861b0d5fbe452
                                                                            • Instruction ID: ee4be40cf8468cb07b8b034ecdba5f851d07d0469f69de09ec69aa2667f5b7fc
                                                                            • Opcode Fuzzy Hash: f340a314f26b042b5fad1aea8344e17fa9399b35e0b34e21c95861b0d5fbe452
                                                                            • Instruction Fuzzy Hash: 28318D34A00205DFDB14DFA8C494AAEBBF6FF89304F148569E405AF3A1C7799C49CBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e0bef7d44269bf3732897c2bd54d74385e631cd5eccb247c8cc840b9a73165c0
                                                                            • Instruction ID: 21423db65b808e67e9144e36f284c86822f6c9e469f123240969e56534b454f4
                                                                            • Opcode Fuzzy Hash: e0bef7d44269bf3732897c2bd54d74385e631cd5eccb247c8cc840b9a73165c0
                                                                            • Instruction Fuzzy Hash: A031B135B002168FCB54DBB8985196FBBF6AF89208B1444BDE545DB3A1EB38DC4287A1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 37e81fcf052c0d5e7328fb78bb5284289a3003572cd503f94144b59688f975bd
                                                                            • Instruction ID: 94d59a1ce1a1bf250dfb54ee4a30bed9d6d5453af1dbe1aa36b15fe948a13d55
                                                                            • Opcode Fuzzy Hash: 37e81fcf052c0d5e7328fb78bb5284289a3003572cd503f94144b59688f975bd
                                                                            • Instruction Fuzzy Hash: 02213C39B001158FE714DBA8C554BADBBE2BF89B14F258158E5069F3A1CA759C01CB51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d7d12374a157851928ee6cc48adc221208e218166b0dbe1f85b07cf6f10b1a88
                                                                            • Instruction ID: 595a5a4c7fa828b9b53a872d59a2943ad53cbe78764f314f0d180e304ed43a01
                                                                            • Opcode Fuzzy Hash: d7d12374a157851928ee6cc48adc221208e218166b0dbe1f85b07cf6f10b1a88
                                                                            • Instruction Fuzzy Hash: 61216234614301CFDB65AFF9E55567E3BA8FB94B85B11243DB812DE280EB38C884DB61
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630319388.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_152d000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: def86433122d15903510f47ce4ab3fc8369d5bf3bb0eb272844ea677cf6ba852
                                                                            • Instruction ID: 0d940c96723602de03e2df70c7791f24f9ba77e12b43c40fc9d5d57ed83c2c7d
                                                                            • Opcode Fuzzy Hash: def86433122d15903510f47ce4ab3fc8369d5bf3bb0eb272844ea677cf6ba852
                                                                            • Instruction Fuzzy Hash: 862148B2500240DFDB05CF54D9C0BAABBB1FB85324F24C569E8050F686C376E44AC7E1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630319388.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_152d000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7eed09ce4d53d5ee984c139b6836afbd8ce7a30df76fd671ec343b35d27d39e2
                                                                            • Instruction ID: 1852296ce34299e835e312755a5b3ab7fb760c119e28d37f007c1531142781a5
                                                                            • Opcode Fuzzy Hash: 7eed09ce4d53d5ee984c139b6836afbd8ce7a30df76fd671ec343b35d27d39e2
                                                                            • Instruction Fuzzy Hash: 6B2148B2604240DFDB01CF94D9C0B6ABFB1FB85328F24C569E9050F296C3BAD449C7A1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d6492cee4d6e7a2de40b67d47dcde90f6fc90d13708d630f274889eefc29632a
                                                                            • Instruction ID: 5ae537ba6d3f982b2aabce6843fa3776000c950a7b4370c9a2b12d609a97c747
                                                                            • Opcode Fuzzy Hash: d6492cee4d6e7a2de40b67d47dcde90f6fc90d13708d630f274889eefc29632a
                                                                            • Instruction Fuzzy Hash: E2214134715201CFDF69AFF9951562E3AA4FB94A89B21183CB816CE280EB38C484DB61
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630319388.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_152d000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6b6e80efca3d6f4b3c80f07f18239913a808e1f69b855b1855883133c21e4cdf
                                                                            • Instruction ID: 1047368e5efb1e4d66094f8de80be0a34204d5f752da82dc8c32694d927c61f3
                                                                            • Opcode Fuzzy Hash: 6b6e80efca3d6f4b3c80f07f18239913a808e1f69b855b1855883133c21e4cdf
                                                                            • Instruction Fuzzy Hash: BC11E172504280CFDB02CF44D5C0B1ABF71FB84324F24C6A9D9050F656C37AD456CBA2
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630319388.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_152d000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6b6e80efca3d6f4b3c80f07f18239913a808e1f69b855b1855883133c21e4cdf
                                                                            • Instruction ID: 575a3b9ad00cb5c955f1e517eb27afbc84f0b27713a26d5f9402d1852c453ec2
                                                                            • Opcode Fuzzy Hash: 6b6e80efca3d6f4b3c80f07f18239913a808e1f69b855b1855883133c21e4cdf
                                                                            • Instruction Fuzzy Hash: 6511E172404280CFCB02CF54D9C0B5ABF71FB84324F24C6A9D8484B656C37AE45ACBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 205cc467b55ab776de7e071fbb9e70cb642d6a5b68e3d69e3fde76a508be2e2a
                                                                            • Instruction ID: aa9788eed7da2da02aefc2cbf2bca57236be645484c036cc21ed46ff669f9d98
                                                                            • Opcode Fuzzy Hash: 205cc467b55ab776de7e071fbb9e70cb642d6a5b68e3d69e3fde76a508be2e2a
                                                                            • Instruction Fuzzy Hash: 8911C270B00250CFCB54EFB8D4A69AA7BF5EF8925470504B8C805EB312EB39CC02CB90
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e792f8cf18bc0e9b2d035d4de3a42dd0920812593ae039b4f7cf33e61ef59351
                                                                            • Instruction ID: e9064f5b8ef380cb2e532035c5cb897bd00cb14a2216dc3335ebe974915ede9e
                                                                            • Opcode Fuzzy Hash: e792f8cf18bc0e9b2d035d4de3a42dd0920812593ae039b4f7cf33e61ef59351
                                                                            • Instruction Fuzzy Hash: C4118B70B00214CFCB54EFB9D4A59AA77EAEF886887110479D406EB311EF39DC06CB90
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b11aef17f03f04a9177e2ccc2f20920f3091eb240d682b2c4e6d89d116bab7da
                                                                            • Instruction ID: c83fcf46c6a47310cac461f6b56b1ca5a2f075cf07e4c922d8c730775af64940
                                                                            • Opcode Fuzzy Hash: b11aef17f03f04a9177e2ccc2f20920f3091eb240d682b2c4e6d89d116bab7da
                                                                            • Instruction Fuzzy Hash: 46012D303083514FC7459778A8244AE3BE7EFCB16531544BAD009CF3B2DE2C8C0A8761
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 71612034010edcc2d9da9d93a8236c48bfadab4c1431a53814cded80629a6747
                                                                            • Instruction ID: 2963e1d8874aab1dcff818f65326d94e036294f6c50401c27f2ce89910bf1e17
                                                                            • Opcode Fuzzy Hash: 71612034010edcc2d9da9d93a8236c48bfadab4c1431a53814cded80629a6747
                                                                            • Instruction Fuzzy Hash: 3CE0C2313002204F8754967EB884C5BB7DAEFCD1B93150079F109C7321DE75DC018790
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8ffc4c852021ea605d5615a658f9301b7460b294fa6bc080ea93d16e00fa648c
                                                                            • Instruction ID: 9a9e53f29b613475d89164fa13724e2399bda62455efc220a7334f8c3385e7d7
                                                                            • Opcode Fuzzy Hash: 8ffc4c852021ea605d5615a658f9301b7460b294fa6bc080ea93d16e00fa648c
                                                                            • Instruction Fuzzy Hash: 41C08C2801A280CFDB362FF4A10CA6C3AA077E0B08F119458B0230EBC5DF3408CC9752
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.630570543.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_15c0000_llcubnch6T.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 25606345fde8d0a54cb92def09a30476f4b54644b817ab70aaed0dc26ad4b451
                                                                            • Instruction ID: ae7daa2f395b99c13f48d3c084048a823c71f735d4c6b2567ff68ed6b05c1c0d
                                                                            • Opcode Fuzzy Hash: 25606345fde8d0a54cb92def09a30476f4b54644b817ab70aaed0dc26ad4b451
                                                                            • Instruction Fuzzy Hash: AEC04C2C41A241CFD7762FF4A10DA6C39A07BE0B09F519458B4635EBC9DF34488C9BA2
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%